A boot location is a portion of a drive with adequate space required for a software installation. This was previously referred to in other documentation as a boot slot.
The Configuration utility is the browser-based application that you use to configure the LTM system.
See configuration synchronization.
Configuration synchronization is the task of duplicating the BIG-IP system or Enterprise Manager system configuration data onto its peer unit in a redundant system.
The device list catalogs all devices that Enterprise Manager remotely manages. Adding devices to the device list is the first step in centrally managing the devices in the network.
A group of devices that you can manage as a collection rather than individually is called a device group. For example, you can create an alert for a device group so that the alert applies to all devices that are members of the device group.
Failover is the process whereby a standby unit in a redundant system takes over when a software failure or a hardware failure is detected on the active unit. See also redundant system.
hotfix installation task
A hotfix installation task is a series of jobs that you configure to upgrade one or more managed devices with hotfixes that are stored in the Enterprise Manager hotfix repository.
The interfaces on the Enterprise Manager or other F5 Networks systems are the physical ports that you use to connect each system to other devices on the network.
A managed device is an F5 device, such as a BIG-IP system, that is managed by Enterprise Manager.
The management interface is a special port on the BIG-IP system, used for managing administrative traffic. The management interface, named MGMT, does not forward user application traffic, such as traffic slated for load balancing. See also TMM switch interface.
A pinned archive is a UCS archive (that you create or move from the rotating archive list) that is saved in the Enterprise Manager database until you remove it. See also user configuration set (UCS).
A redundant system is a pair of BIG-IP systems configured for failover. In a redundant system, there are two units, often with one running as the active unit and one running as the standby unit. If the active unit fails, the standby unit takes over and manages connection requests.
Rotating archives are UCS archives created at a regular interval according to the schedule that you set in Enterprise Manager. See also user configuration set (UCS).
SNAT (Secure Network Address Translation)
A SNAT is a feature you can configure on the BIG-IP system. A SNAT defines a routable alias IP address that one or more nodes can use as a source IP address when making connections to hosts on the external network.
SNMP (Simple Network Management Protocol)
SNMP is an industry-standard protocol that gives a standard SNMP management system the ability to remotely manage a device on the network.
software upgrade task
A software upgrade task is a series of tasks that you complete to upgrade managed devices with a software image stored in the Enterprise Manager software repository. Each job consists of one individual device upgrade.
The syslog-ng utility is an enhanced version of the standard UNIX and Linux logging utility, syslog. Enterprise Manager uses this utility to log system events.
System certificates are the web certificates that allow client systems to log into the BIG-IP system Configuration utility.
TMM switch interface
TMM switch interfaces are those interfaces that the BIG-IP system uses to send or receive application traffic, that is, traffic slated for load balancing. See also, management interface.
Traffic certificates are server certificates that a managed device uses in its traffic management tasks.
user configuration set (UCS)
A user configuration set is a backup file that you create for the BIG-IP system or Enterprise Manager system configuration data. When you create a UCS, the system assigns a .ucs extension to the file name.
A warm backup is a system that duplicates the configuration information of its peer device, and can perform all of the functions of its peer, but requires manual intervention to maintain the integrity of the backup configuration information.