Welcome to DevCentral

 

Featured Articles

LTM Policy Recipes

LTM Policy is the powerful and performant replacement to the HTTP Class, and first appeared in Big IP 11.4.0.   This is intended to be a short article showing some practical recipes using LTM Policy.  Please also check out another...

Slave Malware Analysis

During the last couple of weeks, Nathan Jester, Elman Reyes, Julia Karpin and Pavel Asinovsky got together to investigate the new “Slave” banking Trojan. According to their research, the early version of the Slave performed IBAN swapping in two...

Demystifying iControl REST Part 2 - Understanding sub collections and how to use them

iControl REST. It’s iControl SOAP’s baby brother, introduced back in TMOS version 11.4 as an early access feature but was released fully in version 11.5. Several articles on basic usage have been written on iControl REST (see the resources at the...

Live Developer Q&A: Cisco ACI and F5 Synthesis – Under the Hood

Tuesday June 16th marked the first of a kind with representatives of both Cisco and F5 jointly participating in a Live Developer Q&A – how far we’ve come since the days of rivalry to now, working as closely aligned allies. [insert pic] ...

Demystifying iControl REST Part 1 - Understanding the request URI

iControl REST. It’s iControl SOAP’s baby brother, introduced back in TMOS version 11.4 as an early access feature but was released fully in version 11.5.  Several articles on basic usage have been written on iControl REST (see the resources...

Recent Articles

Node.js ABC’s - J is for JavaScript

Node.js is an open source runtime environment for server-side and network based applications.  At it's core, Node.js uses the Google V8 JavaScript engine to execute client code and a large portion of the core basic modules are written in JavaScript.  Since, for all practical purposes, writing Node.js applications is writing JavaScript applications, it makes sense to try to...

Measuring and Monitoring: Apps and Stacks

One of the charter responsibilities of DevOps (because it's a charter responsibility of ops) is measuring and monitoring applications once they're in production. That means both performance and availability. Which means a lot more than folks might initially think because generally speaking what you measure and monitor is a bit different depending on whether you're looking ...

Node.js ABC’s - I is for Inheritance

The ability to create a class and then extend it is the basis for object-oriented programming.  Inheritance in object-oriented programming is when an object, or class, is derived from another object using the same core implementation.  Inheritance in JavaScript is a little different than other languages as there is no explicit class keyword and a mechanism for specify a derived...

LTM Policy Recipes

LTM Policy is the powerful and performant replacement to the HTTP Class, and first appeared in Big IP 11.4.0.   This is intended to be a short article showing some practical recipes using LTM Policy.  Please also check out another article with a more complete overview of LTM Policy. While there are iRules which can be used to address each of the following scenarios, LTM Policy...

F5 Programmability – now in new GitHub flavor!

In a year of many firsts I am particularly excited about this announcement. The release of the F5 Aplication Services Integration iApp on ... wait for it ... GitHub! What are iApps? For those unfamiliar with iApps, they are a means to vastly simplify the deployment of F5's application services. It should be easy to improve the performance, availability, and security of your...

Slave Malware Analysis

During the last couple of weeks, Nathan Jester, Elman Reyes, Julia Karpin and Pavel Asinovsky got together to investigate the new “Slave” banking Trojan. According to their research, the early version of the Slave performed IBAN swapping in two steps with great resemblance to the Zeus “man-in-the-browser” mechanism. First, the host header is compared to a hard-coded bank name. If the match is...

Whiteboard Wednesday: BIG-IP Life of a Packet

Jason dives into the life of a packet/flow through the BIG-IP in this latest installment of Whiteboard Wednesday. Drop any questions or comments below and we'll address or clarify as necessary.

Encrypted Content Cannot be Optimized, but the Delivery Platform Can

#LTEWS #TCPOptimization Someone recently asked me about TCP optimization and what it really was and why it was important for today’s networks. I have previously written a blog post about how TCP optimization can improve the delivery of content to the consumer. Now, let’s go into a little detail as to why we need TCP optimization and how it works. As you can see in the graphic, traffic on the...

IoT를 위한 인프라

Please find the English language post from which this was adapted here. IoT 애플리케이션들이 다양한 형태와 크기로 생겨나고 있는 상황에서 고객과 비즈니스를 모두 지원하기 위한 가장 중요한 요소로 가용성이 손꼽히고 있다. 가장 기본적인 고가용성 아키텍처는 전형적인 3단형 디자인이다. 우선 네트워크 DMZ 내의 복수의 ADC 장비들이 서버의 즉각적인 연결을 차단한다. 이후 고객들의 요청을 IoT 애플리케이션 서버들에 영리하게 분배하고 해당 IoT 애플리케이션 서버들은 적합한 컨텐츠에 대해 데이터베이스 서버들에 문의한다. 각 단은 추가적인 서버를 가지고 있어 서버가 정지될 경우, 여분의 서버들이 부하를 처리해 시스템은 그대로...

Sometimes a Hack is Not a Hack, but We Should Still Worry

#LTEWS #Security I was at a roundtable discussion recently talking about security in the mobile carrier networks. During the discussion the recently announced SS7 signaling hack was introduced as an example. I would propose that this vulnerability is not a hack, but just poor design where trust is poorly assumed. Before you scream that I have my head stuck in the sand and I am ignoring a...

Recent Questions and Answers

arpydays 79 answered the question Cleanup
12 minutes ago Read More
Brian Dean 2 answered the question SSL Client Profile Cipher Suites
1 hour ago Read More
Stefan Klotz 250 answered the question SSL Client Profile Cipher Suites
2 hours ago Read More
Stefan Klotz 250 answered the question about captcha
2 hours ago Read More
giltjr 679 answered the question The CPU Utilization and ASM CUP Utilization
3 hours ago Read More
Liran Ben Abu 2 answered the question Powershell list certificates
3 hours ago Read More
Liran Ben Abu 2 answered the question Powershell list certificates
3 hours ago Read More
More Questions »