Skip to content
  • There are no suggestions because the search field is empty.

How to extract the configuration for Big-IP F5 v9.4.3 Devices

Follow the steps below to extract the configuration for Big-IP F5 v9.4.3 Devices

Please Note: This guide is for Nipper (v2) only. 

Using SSH, Telnet or direct console connection

For this procedure you will be using the Command Line Interface (CLI) of your Big-IP F5 device using an SSH client (such as OpenSSH or Putty), Telnet or through the console port. We would recommend using either SSH (for remote connections) or using a direct connection to the console port. Telnet provides no encryption of the communications and therefore your authentication credentials and configuration would be vulnerable if a malicious user were to monitor your connection.

  1. Connect to the Big-IP F5 using your favorite SSH client, Telnet or a direct console connection.

  2. Certain Big-IP devices will be capable of dual booting so make sure that you have selected the correct version for the following instructions.

  3. Logon using your administration authentication credentials.Nipper_Big_IP_F5_v9_4_3_Devices_685x429

  4. Execute the following CLI command to access the bigpipe shell: bpshNipper_Big_IP_F5_v9_4_3_Devices
  5. The command prompt will change to: bp>
  6. From the bigpipe shell run the command exportNipper_Big_IP_F5_v9_4_3_Devices_1
  7. Capture the output (using cut and paste, for example).
  8. Save the captured output to a text file on your local machine.
  9. This text file will be readable by Nipper.