Skip to content
  • There are no suggestions because the search field is empty.

How to extract the configuration for Big-IP F5 v11.x.x Devices

Follow the steps below to extract the configuration for Big-IP F5 v11.x.x Devices

Please Note: This guide is for Nipper (v2) only. 

Using SSH, Telnet or direct console connection

For this procedure you will be using the Command Line Interface (CLI) of your Big-IP F5 device using an SSH client (such as OpenSSH or Putty), Telnet or through the console port. We would recommend using either SSH (for remote connections) or using a direct connection to the console port. Telnet provides no encryption of the communications and therefore your authentication credentials and configuration would be vulnerable if a malicious user were to monitor your connection.

  1. Connect to the Big-IP F5 using your favorite SSH client, Telnet or a direct console connection.

  2. Certain Big-IP devices will be capable of dual booting so make sure that you have selected the correct version for the following instructions.

  3. Logon using your administration authentication credentials.Nipper_Big_IP_F5_v11_x_x_Devices

  4. Enter the command tmsh
    Nipper_Big_IP_F5_v11_x_x_Devices_1
  5. Next enter the command show running-config
    Nipper_Big_IP_F5_v11_x_x_Devices_2
  6. Capture the output (using cut and paste, for example).
    Nipper_Big_IP_F5_v11_x_x_Devices_3
  7. Save the captured output to a text file on your local machine
  8. This text file will be readable by Nipper.