INTRODUCTION For resiliency purposes, Layer2 topologies are designed and deployed in a physical loop. Unlike the IP protocol which uses the TTL field as a built-in mechanism for preventing packets from looping endlessly through the network, the Ethernet protocol does not provide such facility and therefore, unless we can prevent a layer2 loop, the following problems would occur: Broadcast storms – endless broadcast of frames through the entire L2 domain Hosts end-up receiving duplicates frames from different switches Unstable mac-address tables due to continuous host mac address learning on different ports The STP (Spanning Tree Protocol) was developed to avoid…
There will be situations when you just need to replicate sections (or all) of your configuration from one BIGIP device, to another – only with slight differences. In this blog, I’ll show you how to do this via the CLI.
In this second part, I will provide you a step-by-step guide on how to setup Active Directory authentication on the F5 BIGIP.
In this blog we will look into: How to configure Priority Group Activation? How does the algorithm work? Real world use case examples.