After you activate the license, complete the initial setup, and specify your network configuration options, you can customize settings for other Enterprise Manager™ features.
The configuration details of managed devices (including Enterprise Manager itself) are contained in a compressed user configuration set (UCS) file with the extension of .ucs. This file contains all of the information required to restore a device's configuration, and consists of these elements:
Enterprise Manager saves UCS files to a UCS archive. You can create a task to save UCS archives for devices at regularly scheduled intervals. Archives that are created and saved on a schedule are called, rotating archives. When the system creates rotating archives, it compares the most recently stored UCS archive file to the current configuration on the device at the specified interval. If there are any differences, Enterprise Manager stores a copy of the current configuration in a UCS archive. If there are no differences, Enterprise Manager does not store an additional copy of the current configuration, which leaves you room to store a higher number of unique historical UCS archives. When Enterprise Manager reaches the maximum number of archives specified to store, it deletes the oldest archive in the rotating archive list. By default, Enterprise Manager stores up to 10 rotating archives each, for itself and every managed device.
Another option for archive storage is to create an archive of a specific UCS for a device, referred to as a pinning an archive. Enterprise Manager also creates a pinned archive of a device's current configuration before it installs new software. Pinned archives are stored until you delete them.
|Include||Select this option if you want the system to store private key data when it creates a configuration archive. This is the default setting.|
|Exclude||Select this option if you do not want the system to store private key data when it creates a configuration archive. Note that if you select this option, you must manually restore the keys if you restore the archive.|
Each time you log in to Enterprise Manager™ a startup screen displays. By default, the startup screen is the Welcome screen, but you have the option to change this screen if you find an alternative screen more useful.
You can customize your system to display a specific screen upon startup.
You can use this table to determine which screens are most relevant to your needs.
|Default startup screen option||Description||To access|
|Welcome||Contains links to setup, support, plug-ins, and additional downloads.||Click Overview and Welcome.|
|Performance||Displays statistics related to the Enterprise Manager system performance.||Click Overview and Performance.|
|Device List||Displays a list of all of the devices you are managing with Enterprise Manager.||Click Enterprise Management and Devices.|
|Task List||Displays a list of running and completed tasks.||Click Enterprise Management and Tasks.|
|Custom Lists||Displays a customizable list of objects.||Click Enterprise Management and Custom Lists.|
A user role specifies the type of management tasks that a user can perform on managed devices in your network. Permissions for user roles are classified as either non-restricted or restricted. The user roles are defined as:
Users are authenticated through Enterprise Manager's local database.
There are eight different types of permissions that you can specify for each restricted user role. You can specify any of these management task permissions to the Operator and Application Editor user roles.
|Manage Device Configuration Archives||Create and manage UCS archives for all managed devices|
|Browse Device Configurations||View configurations from the Enterprise Manager configuration browser|
|Compare Device Configuration Archives||Compare UCS configuration files between two devices|
|Stage Changesets for Deployment from Published Templates||Create a new staged changeset from a published template|
|Deploy Staged Changesets||Deploy a staged changeset created by a user|
|Administer Device Lists||Manage device list members|
|Synchronize Device Configuration with Peer||Synchronize peer device configurations|
|Failover Devices||Initiate a failover to a peer managed device|
All users and their privileges are displayed in the User list.
|Administrator||Grants user complete access to all objects on the system and permission to perform configuration synchronization on a redundant system.|
|Operator||Grants user permission to enable or disable existing nodes and pool members.|
|Application Editor||Grants user permission to modify existing nodes, pools, pool members, and monitors.|
If you do not want to expose the IP address of the Enterprise Manager system or devices, you can use a proxy server specific to the type of communication.
|Internet proxy server||For outbound communication from the EM to F5 Networks for download licensing information, support information, and Application Security Manager attack signature files|
|Device proxy server||For communication between Enterprise Manager and managed devices in your network|
|iControl proxy server||For inbound communication to managed devices, required for authentication, pass-through, and device inventory|
|SMTP proxy server||For alert email notification|
You can configure Enterprise Manager to use a single proxy for SSL and FTP connections, or to use a unique proxy for each protocol.
When you specify an Internet proxy, Enterprise Manager™ uses that proxy for tasks configured through its task wizards, such as the Licensing wizard.
For example, if you create a task to update the licensing information for a device, Enterprise Manager sends the licensing information through the specified proxy. Conversely, if instead of using the Licensing wizard, you select License option from the System menu on the Main tab to update the licensing information for a device, Enterprise Manager does not send the licensing information through the configured proxy.