Learn F5 Technologies, Get Answers & Share Community Solutions Join DevCentral

Security Month on DevCentral

Posted February 22, 2017 by John Wagnon

We are always interested in security at F5, but this month we are taking it a step further and highlighting lots of great security content on DevCentral. From discussing specific F5 security technology to looking back on security trends from 2016 to looking ahead at what's to come in 2017, the month of February on DevCentral will not disappoint! Read more

What To Expect In 2017: Security And Government Regulations

Posted February 22, 2017 by Chase Abbott

The government and cloud security's relationship is surprisingly hands off. Current regulations already extend their umbrellas over our data in flight and rest regardless who's IaaS/SaaS you're using. For us traditional enterprise... Read more

What To Expect In 2017: Security In The Cloud

Posted February 21, 2017 by Chase Abbott

DevCentral examines cloud security trends for 2017 and takes a few stabs at the reality of your realistic requirements. Security is a chess board. Of the primary fundamentals in chess the King is the most valuable piece (losing the game if you lose the King) and the Queen is the most powerful piece (in terms of... Read more

What to Expect in 2017: Mobile Device Security

Posted February 20, 2017 by Peter Silva

We are mobile, our devices are mobile, the networks we connect to are mobile and the applications we access are mobile. Mobility, in all its iterations, is a huge enabler and concern for enterprises and it'll only get worse as we start wearing... Read more

Security Month on DevCentral: Challenge #1

Posted February 17, 2017 by John Wagnon

As we highlight security on DevCentral this month, we wanted to pose a fun security challenge to exercise those brain cells a little bit. Today's challenge focuses on cryptography. The object of this challenge is to figure out a plaintext message given some ciphertext and clues. Read more

Introducing the F5 Security Incident Response Team (F5 SIRT)

Posted February 16, 2017 by John Wagnon

When your business is facing a security crisis, F5 has a team dedicated to helping you through it – the F5 Security Incident Response Team (SIRT). During a security incident, the F5 SIRT engages rapidly with the resources you need to respond. The F5 SIRT also evaluates potential and published vulnerabilities and provides timely alerts to help you manage risks and deploy mitigation – before an attack brings down your business. Read more

Abusing Open Resolvers

Posted February 15, 2017 by John Wagnon

Open DNS resolvers can be used to recursively query authoritative name servers. In fact, a list of open resolvers can be found at http://openresolverproject.org/. Further, Network Time Protocol (NTP) servers with "monlist" enabled allow a host to query the last 600 connections who have connected to that server... Read more

Encrypted malware vs. F5's full proxy architecture

Posted February 14, 2017 by John Wagnon

Everyone knows that malware is a huge problem, and several recent studies have shown that nearly half of all malware is now encrypted. So, if all this malware is encrypted, then how do you go about finding it and stopping it if you can't even read it? Read more

Answers / discussion

​​
OpenSSL and Heart Bleed Vuln

Asked 4/7/2014

by squip

21 Votes

​​
iRule Event Order - HTTP

Asked 11/8/2013

by What Lies Beneath

18 Votes

​​
TCP Traffic Path Diagram

Discussed 5/13/2014

by What Lies Beneath

12 Votes

​​
​​
F5 Big IP File Locations

Asked 8/24/2009

by JohnCzerwinski

10 Votes

​​
​​