Applies To:

Show Versions Show Versions

Manual Chapter: External File Management
Manual Chapter
Table of Contents   |   << Previous Chapter   |   Next Chapter >>

You can import certain external files for use by iRules®, or you can import or create SSL certificates. The external files that iRules can use can be data group files and iFiles. Using the BIG-IP Configuration utility, you can manage these external files or SSL certificates from a central location.
To use this feature, log in to the BIG-IP Configuration utility, and on the Main tab, expand System, and click File Management.
Using the BIG-IP Configuration utility, you can import an existing file from another system to the BIG-IP system with content that you want to reference in an iRule.
Figure 6.1 shows an example of an address data group. This example shows host and network entries that have or lack corresponding values.
class addr_testclass {
{
host 192.168.1.1
host 192.168.1.2 { "host 2" }
network 192.168.2.0/24
network 192.168.3.0/24 { "network 2" }
}
}
Figure 6.2 shows an example of an integer data group. This example shows integer entries that have corresponding values.
class int_testclass {
{
1 { "test 1" }
2 { "test 2" }
}
}
Figure 6.3 shows an example of a string data group. This example shows string entries that have or lack corresponding values.
class str_testclass {
{
"str1" { "value 1" }
"str2" { "value 2" }
}
}
To use this feature, you first import an existing file to the BIG-IP system and then assign a new name to the file. To import a file and assign it a new name, log in to the BIG-IP Configuration utility, and on the Main tab, expand System, and click File Management.
After importing the file, you use the Local Traffic area of the Configuration utility to create a new data group based on the imported file. You can then reference the new data group from within an iRule. For more information, see the guide titled BIG-IP® Local Traffic ManagerTM: Concepts.
Using the BIG-IP Configuration utility, you can import an existing file or URL from another system to the BIG-IP system, with content that you want an iRule to return to a client based on some iRule event.
To use this feature, you first import an existing file or URL to the BIG-IP system and then assign a new name to the file. To import a file with the Configuration utility and assign it a new name, you use the System area of the navigation pane. This imported file has these attributes:
Next, you associate the newly-named imported file with an iFile, which is a file you create for referencing within an iRule. For more information, see the guide titled BIG-IP® Local Traffic ManagerTM: Concepts.
Using the BIG-IP Configuration utility, you can import an existing external program monitor file to the BIG-IP system, with content that an external monitor can reference.
To use this feature, you first import an existing file from another system to the BIG-IP system and then assign a new name to the file. To import a file and assign it a new name, log in to the BIG-IP Configuration Utility®, and on the Main tab, expand System, and click File Management.
After importing the file, you use the Local Traffic area of the Configuration utility to create a new external monitor program based on the imported file. For more information, see the guide titled BIG-IP® Local Traffic ManagerTM: Concepts.
Using the BIG-IP Configuration utility, you can import an existing certificate file from another system to the BIG-IP system, or you can create a new SSL certificate. To import or create an SSL certificate, log in to the BIG-IP Configuration utility, and on the Main tab, expand System, and click File Management.
Security type, either Normal or FIPS (FIPS-enabled systems only)
There are several types of files that you can import using the File Management screens of the BIG-IP Configuration utility. These file types are:
Note: Do not attempt to manage certificates by copying SSL certificate files into the /config/ssl/* directory and then reloading the system configuration. Certificate-related files are not stored in that location. Therefore, you must use the BIG-IP Configuration utility or tmsh to manage certificate files, key files, and CRL files.
Table of Contents   |   << Previous Chapter   |   Next Chapter >>

Was this resource helpful in solving your issue?




NOTE: Please do not provide personal information.



Incorrect answer. Please try again: Please enter the words to the right: Please enter the numbers you hear:

Additional Comments (optional)