Learn F5 Technologies, Get Answers & Share Community Solutions Join DevCentral

Traffic Management Shell (tmsh)

F5 developed tmsh to allow complete access to all advanced features of F5 devices. Using tmsh you can configure and manage the system from the command line. You can also configure BIG-IP to manage local and global traffic, as well as view system performance data.

Learn more

Articles

Chase Abbott
Updated 5 months ago by Chase Abbott
5 out of 5 stars

Following up on our previous article AFM Enhancements In BIG-IP v13, we'll narrow our discussion for this article to Denial-Of-Service (DoS) updates in v13. Architectural changes in BIG-IP's user interfaces allows for increased flexibility...

Dan G.
Updated 3/8/2017 by Dan G.
5 out of 5 stars

Migrating to iSeries From Older Platforms: It’s About Time Imagine this situation:  It’s a great day because the new F5 gear has come in and you can take advantage of the years of software and hardware advancements that have been included in...

Satoshi Toyosawa
Updated 1/3/2017 by Satoshi Toyosawa
4.5 out of 5 stars

Cheat sheet for the virtual server related iControl REST requests.

Jason Rahm
Updated 4/25/2016 by Jason Rahm

In this episode of A Catch from the Codeshare, Jason highlights a tmsh script from community member Kai that removes a specified iRule from any virtual servers from which it is applied.

Michael J
Updated 2/12/2016 by Michael J

US FEDERAL CCRI Lessons Learned

Matthieu Dierick
Updated 7/27/2015 by Matthieu Dierick
5 out of 5 stars

Author : Arnaud Fauvel (Obiane – Orange Group – France)   Introduction : As explained in “SOL9420: Installing a UCS file containing an encrypted passphrase”: Passphrases used for configuration items, such as monitors, profiles, and...

Jason Rahm
Updated 6/8/2015 by Jason Rahm

Back in 2006, DevCentral was just a toddler. The great thing about toddlers is they grow like crazy, constantly learning new things and building skills at a rapid pace. Such was the case for us. I was a customer at the time and I got a call from...

Jason Rahm
Updated 6/4/2015 by Jason Rahm
5 out of 5 stars

I was working on a GTM solution and with my limited lab I wanted to make sure that the decisions that F5 BIG-IP Global Traffic Manager made at the wideIP and pool level were as evident in the logs as they were consistent in my test results. It...

Jason Rahm
Updated 6/3/2015 by Jason Rahm

Jason takes a high level view of the iCall event-based automation system on F5 BIG-IP.  Resources Articles iCall Introduction Configuration Backups Disable Interface on Unavailable Pool Codeshare Samples  Technorati Tags: icall, f5...

Ranjeet Sonone
Updated 2/2/2015 by Ranjeet Sonone

In this article we will look at how F5 continues to deliver the Management and Orchestration solutions for deploying Application Delivery Controller (ADC) platform services. We will begin with explaining how F5 approached Management solutions and...

Chase Abbott
Updated 5 months ago by Chase Abbott
5 out of 5 stars

Following up on our previous article AFM Enhancements In BIG-IP v13, we'll narrow our discussion for this article to Denial-Of-Service (DoS) updates in v13. Architectural changes in BIG-IP's user interfaces allows for increased flexibility...

Dan G.
Updated 3/8/2017 by Dan G.
5 out of 5 stars

Migrating to iSeries From Older Platforms: It’s About Time Imagine this situation:  It’s a great day because the new F5 gear has come in and you can take advantage of the years of software and hardware advancements that have been included in...

Matthieu Dierick
Updated 7/27/2015 by Matthieu Dierick
5 out of 5 stars

Author : Arnaud Fauvel (Obiane – Orange Group – France)   Introduction : As explained in “SOL9420: Installing a UCS file containing an encrypted passphrase”: Passphrases used for configuration items, such as monitors, profiles, and...

Jason Rahm
Updated 6/8/2015 by Jason Rahm

Back in 2006, DevCentral was just a toddler. The great thing about toddlers is they grow like crazy, constantly learning new things and building skills at a rapid pace. Such was the case for us. I was a customer at the time and I got a call from...

Jason Rahm
Updated 6/4/2015 by Jason Rahm
5 out of 5 stars

I was working on a GTM solution and with my limited lab I wanted to make sure that the decisions that F5 BIG-IP Global Traffic Manager made at the wideIP and pool level were as evident in the logs as they were consistent in my test results. It...

Ranjeet Sonone
Updated 2/2/2015 by Ranjeet Sonone

In this article we will look at how F5 continues to deliver the Management and Orchestration solutions for deploying Application Delivery Controller (ADC) platform services. We will begin with explaining how F5 approached Management solutions and...

John Wagnon
Updated 10/6/2014 by John Wagnon

These past two weeks have proven to be more than eventful with the "shock"ing discovery of a critical bash vulnerability that stole the security headlines for several days.  Times like these might have you repeating the words of the...

Thomas Schockaert
Updated 3/12/2014 by Thomas Schockaert
5 out of 5 stars

Hi all,   Often I've been scouring the devcentral fora and codeshares to find that one piece of handywork that will drastically simplify my automated backup needs on F5 devices. Based on the works of Jason Rahm in his post "Third...

Colin Walker
Updated 2/12/2014 by Colin Walker

So you’ve heard of this iControl REST thing, have you? You’re excited at the idea of a simple, light weight API that allows you programmatic access via tried and true tmsh commands with which you may already be familiar? Whether it was in the...

Colin Walker
Updated 2/3/2014 by Colin Walker

iControlREST provides a representation state transfer interface to F5's BIG-IP management plane functions.

Have a TMSH Question or Discussion Topic?

Answers

f5 LB iRule Redirection for POST method
Updated 2 days ago
By Root44
0 votes
Monitor based on Server Performance
Updated 3 days ago
By SL
0 votes
tcpdump utility on 12.X virtual F5
Updated 1 week ago
By Abe
0 votes
PowerShell upload to device via iControl
Updated 1 week ago
0 votes
Exporting Security Policy using tmsh
Updated 1 week ago
By Nzhdeh
0 votes