Applies To:
Show VersionsBIG-IP AAM
- 13.0.1, 13.0.0, 12.1.5, 12.1.4, 12.1.3, 12.1.2, 12.1.1
BIG-IP APM
- 13.0.1, 13.0.0, 12.1.6, 12.1.5, 12.1.4, 12.1.3, 12.1.2, 12.1.1
BIG-IP Link Controller
- 13.0.1, 13.0.0, 12.1.6, 12.1.5, 12.1.4, 12.1.3, 12.1.2, 12.1.1
BIG-IP Analytics
- 13.0.1, 13.0.0, 12.1.6, 12.1.5, 12.1.4, 12.1.3, 12.1.2, 12.1.1
BIG-IP LTM
- 13.0.1, 13.0.0, 12.1.6, 12.1.5, 12.1.4, 12.1.3, 12.1.2, 12.1.1
BIG-IP AFM
- 13.0.1, 13.0.0, 12.1.6, 12.1.5, 12.1.4, 12.1.3, 12.1.2, 12.1.1
BIG-IP PEM
- 13.0.1, 13.0.0, 12.1.6, 12.1.5, 12.1.4, 12.1.3, 12.1.2, 12.1.1
BIG-IP DNS
- 13.0.1, 13.0.0, 12.1.6, 12.1.5, 12.1.4, 12.1.3, 12.1.2, 12.1.1
BIG-IP ASM
- 13.0.1, 13.0.0, 12.1.6, 12.1.5, 12.1.4, 12.1.3, 12.1.2, 12.1.1
Software Management
About software management
You can manage the software images, hotfixes, and boot locations on the BIG-IP® system using the Configuration utility. You can also enable the automatic software update feature.
Importing a software image
Installing a software image
Importing a hotfix image
Installing a hotfix image
Booting to a different volume
Configuring update check
- On the Main tab, click .
-
For the Automatic Update Check setting:
- Select Enabled if you want the system to check for updates automatically.
- Select Disabled if you want to check for updates manually.
- Click Apply Settings to save your changes.
- Optional: Click Check Now to manually check for updates.
About Liveinstall signature checking in ccmode
For each full release ISO, vADC OVA, and hotfix ISO, a corresponding signature file will be available with the .sig extension. The signature file is handled exactly like an ISO. When the ccmode feature is turned on, the installation process requires you to download the ISO file, as well as the iso.sig.
The signature file is located in iso-name.384.sig, and uses the 307 key/384 hash signature. If an older key (2048 key/256 has signature) is also found, the system will attempt to validate the signature created by the larger key size (the 307 key/384 hash signature).
When you run the ccmode script to put the sensor into a Common Criteria configuration, a db variable called liveinstall.checksig is automatically enabled. This feature compares the ISO file against a sys software signature file, which is meant to catch integrity issues with the product.
Signature validation is the first step performed during the liveinstall process, so if the corresponding signature file for the selected software is not in the library, the installation will not begin.
In the event of liveinstall failure, two error messages can occur:
- Signature file not found
- This means you have not downloaded the corresponding iso.sig file with the ISO. The best way to verify if the iso.sig is present is to run the command list sys software signature. The command show sys software will not show the iso.sig files.
- Archive signature test failed
- This might happen if:
- The product ISO is in /shared/images.
- The iso.sig is present in /shared/images.
- When the iso.sig file was compared against the product ISO, the comparison failed.