Learn F5 Technologies, Get Answers & Share Community Solutions Join DevCentral

Technical Article

APM Cookbook: Modify LDAP Attribute Values using iRulesLX

Posted September 27, 2016 by Brett Smith

Introduction Access Policy Manager (APM) does not have the ability to modify LDAP attribute values using the native features of the product. In the past I’ve used some creative unsupported solutions to modify LDAP attribute values, but with the... Read more

Technical Article

F5 BIG-IP Edge Client Now Supported in Apple macOS Sierra and iOS 10

Posted September 23, 2016 by Jay Kelley

F5 BIG-IP Edge Client and other F5 BIG-IP Access Policy Manager (APM) client features are now supported in Apple macOS Sierra (10.12) as of Tuesday, September 20, 2016 – the same day as the macOS Sierra was released! AND, BIG-IP Edge Client also supports Apple iOS 10 as of September 13, 2016 – the same day as it was released! Read more

Technical Article

Get Your Git Tips Right Here!

Posted September 22, 2016 by Jason Rahm

Yes, baseball season is winding down, but I’m always nostalgic for an evening with 45000 of my closest friends at Busch Stadium here in St Louis. But enough about baseball-I’m not here to offer you overpriced ballpark food and beverages, but... Read more

APIs are not Web Pages

Posted September 22, 2016 by Lori MacVittie

Even though web pages might be built from APIs, they are not the same. There’s a tendency, particularly for networkers, to classify applications by the protocols they use. If it uses HTTP, it must be a web app. The thing is that HTTP has become... Read more

Video Article

Lightboard Lessons: DNS Scalability & Security

Posted September 21, 2016 by Peter Silva

The Domain Name Service (DNS) is one of the most important components in networking infrastructure, enabling users and services to access applications by translating URLs (names) into IP addresses (numbers). Because every icon and URL and all... Read more

Technical Article

Don’t Take the Impostor’s Bait

Posted September 20, 2016 by Peter Silva

Phishing has been around since the dawn of the internet. The term was first used in an AOL Usenet group back in 1996 but it wasn’t until 2003 when many baited hooks and lures started dropping. Popular transaction destinations like PayPal and eBay... Read more

Video Article

Lightboard Lessons: F5 BIG-IP Virtual Edition Lab Configuration

Posted September 14, 2016 by Jason Rahm

In this episode of Lightboard Lessons, I walk through my personal lab configuration on my Mac, utilizing VMware Fusion to deploy the F5 BIG-IP Lab Virtual Edition along with a few Ubuntu LAMP servers and a shopping cart VM for ASM testing. Fusion... Read more

Liegt die IT-Sicherheit in der Verantwortung der Endgerätenutzer?

Posted September 14, 2016 by Markus Haertner

Die Meldungen über Angriffe, Phishing-Attacken und vielen anderen IT-Sicherheitslöchern reißen nicht ab.  Laut einem aktuellen Bericht der FAZ über Hackerangriffe auf deutsche Banken, werden bei den heutigen Angriffen... Read more

Answers / discussion

​​
HTTPS(X-SSL)

Answered 8 minutes ago

by Kevin Stewart

​​
HTTPS(X-SSL)

Answered 9 minutes ago

by Kevin Stewart

​​
HTTPS(X-SSL)

Asked 9 minutes ago

by faizan123

​​
HTTPS(X-SSL)

Discussed 15 minutes ago

by faizan123

​​
route domain

Asked 1 hour ago

by prak

​​
​​
​​
http proxy for APM connection

Discussed 3 hours ago

by nicoven

​​
Replace HTTP Server with F5

Asked 3 hours ago

by SL

​​
OpenSSL and Heart Bleed Vuln

Asked 4/7/2014

by squip

21 Votes

​​
iRule Event Order - HTTP

Asked 11/8/2013

by What Lies Beneath

18 Votes

​​
​​
F5 Big IP File Locations

Asked 8/24/2009

by JohnCzerwinski

10 Votes

​​
​​
​​