A MAC masquerade address is a unique, floating Media Access Control (MAC) address
that you create and control. You can assign one MAC masquerade address to each traffic group on a
BIG-IP® device. By assigning a MAC masquerade address to a traffic group,
you indirectly associate that address with any floating IP addresses (services) associated with
that traffic group. With a MAC masquerade address per traffic group, a single VLAN can
potentially carry traffic and services for multiple traffic groups, with each service having its
own MAC masquerade address.
A primary purpose of a MAC masquerade address is to minimize ARP communications or dropped
packets as a result of a failover event. A MAC masquerade address ensures that any traffic
destined for the relevant traffic group reaches an available device after failover has occurred,
because the MAC masquerade address floats to the available device along with the traffic group.
Without a MAC masquerade address, on failover the sending host must relearn the MAC address for
the newly-active device, either by sending an ARP request for the IP address for the traffic or
by relying on the gratuitous ARP from the newly-active device to refresh its stale ARP entry.
The assignment of a MAC masquerade address to a traffic group is
optional. Also, there is no requirement for a MAC masquerade address to
reside in the same MAC address space as that of the BIG-IP device.
If there is a VIP or a server ip
configured on a port with ssl certifcates attached to it, telnet cannot be used
to test content on it (for checking ECV monitors) like normal http VIPs/server
IPs. In these cases openssl can be used, thus:
openssl
s_client –connect <ip>:<port>
This will open an SSL connection to
the client reading the certificate in it. At the prompt we can input the GET
string, HOST string etc., to test the content on the VIP/server ip.