Learn F5 Technologies, Get Answers & Share Community Solutions Join DevCentral

A critical error has occurred. Please check the Event Viewer for further details.
Filter by:
  • Solution
  • Technology

Articles

Sort results

Lightboard Lessons: What Are AEAD Ciphers?

The recent TLS 1.3 protocol mandates Authenticated Encryption with Associated Data (AEAD) Ciphers for bulk encryption. As web servers and browsers transition to using these ciphers, it's important to know what they are and how they work... Read more
1 Review

SNI Routing with BIG-IP

In the previous article, The Three HTTP Routing Patterns, Lori MacVittie covers 3 methods of routing. Today we will look at Server Name Indication (SNI) routing as an additional method of routing HTTPS or any protocol that uses TLS protocol that... Read more
Average Rating: 4.9
4 Reviews

New BIG-IP ASM v13.1 WordPress v4.9 Ready Template_v6.1.2

F5 has created a specialized ASM template to simplify the configuration process of WordPress v4.9 with the new version of BIG-IP 13.x Click here to access the .zip file that contains the template:  WordPress v4.9 ASM Template for BIG-IP... Read more
0 Reviews

Configuring Smart Card Authentication to BIG-IP Management Interface

How do we smart card enable our BIG-IP management interface? DevCentral shows how it's done. I will also share some troubleshooting steps, logs and tools I used to overcome my issues while attempting this. So, with that, let's get started. Read more
2 Reviews

New BIG-IP ASM v13.1 Drupal v8 Ready Template_v6.1.2

ASM Ready Template update for Drupal v8 include Goal/Deployment steps Read more
0 Reviews

Remote Code Execution with Spring OAuth Extension (CVE-2018-1260)

Recently, a new Remote Code Execution vulnerability in Spring OAuth extension was published by Pivotal. The OAuth Protocol OAuth is a protocol that supports authorization processes by enabling users to share their data and resources stored on... Read more
0 Reviews

The Three HTTP Routing Patterns You Should Know

HTTP is the de-facto application transport layer. The majority of applications and APIs today are delivered via HTTP, regardless of their content (HTML, JSON, XML).  That means most of the scaling going on is focused on scaling HTTP-based... Read more
0 Reviews

Clone Pool Across L3

Starting in TMOS 13.1 you can now perform a “remote” tcpdump using a GRE tunnel.  We can use the same idea of how the "remote" tcpdump feature works (send raw IP packets over GRE) to enable the F5 BIG-IP  “clone pool” feature to... Read more
0 Reviews

Lightboard Lessons: Explaining TLS 1.3

The newest version of the TLS protocol was recently approved by the Internet Engineering Task Force -- TLS 1.3. There are several key changes in this protocol... Read more
Average Rating: 4.9
4 Reviews

AppSec Made Easy: Credential Protection

Learn how to use the F5 Advanced Web Application Firewall to protect your credentials. Identities are the keys to our applications and criminals can steal them right from the browser. DataSafe protects the credentials at the most vulnerable point. Read more
1 Review

The DevCentral Chronicles Volume 1, Issue 5

Is it May already? Did you enjoy your ‘May the Fourth’ along with ‘Revenge of the Sixth’? For me, May is filled with a bunch of family holidays along with Mother’s Day, of course. May also falls perfectly for our 5th installment of the #DC... Read more
0 Reviews

AppSec Made Easy: L7 Behavioral DoS

Learn how to use the F5 Advanced Web Application Firewall to easily implement Behavioral DoS protections for your application using dynamic signatures to reduce false positives and automate protection. Read more
0 Reviews

AppSec Made Easy: Anti-Bot for Mobile APIs

Learn how to use the F5 Advanced Web Application Firewall to easily lock down your applications so that bots can’t attack your mobile APIs. This video will show you the quick way to add anti-bot and other protections directly into your mobile app. Read more
Average Rating: 4.9
4 Reviews

Lightboard Lessons: F5 DDoS Hybrid Defender

DDoS Hybrid Defender (DHD) is a purpose-built hybrid solution that provides comprehensive L3-7 DDoS mitigation, to prevent network, application, and volumetric attacks... Read more
0 Reviews

Lightboard Lessons: Introducing the F5 Advanced WAF

The F5 Advanced Web Application Firewall (WAF) provides a powerful set of security features that will keep your Web Applications safe from attack... Read more
0 Reviews

AppSec Made Easy: Proactive Bot Defense

Learn how to use the F5 Advanced Web Application Firewall to easily protect your applications against bots. Bots can be used as tools for a variety of attacks such as DoS, credential stuffing and brute force, or web scraping. Read more
1 Review

DevCentral's Featured Member for May - Jai Kumar

Our Featured Member series is a way for us to show appreciation and highlight active contributors in our community. Communities thrive on interaction and our Featured Series gives you some insight on some of our most active folks. Jai Kumar is a... Read more
0 Reviews

Drupal Core Remote Code Execution (CVE-2018-7602)

A new critical Remote Code Execution vulnerability in Drupal core was published. This new vulnerability is similar to CVE-2018-7600, also known as “Drupalgeddon 2”. It was found that the sanitation function that was added to address the... Read more
0 Reviews

Lightboard Lessons: BIG-IP Cloud Edition Overview

In this lightboard lesson, Jason covers the upcoming release of BIG-IP Cloud Edition, a BIG-IQ and Per App VE solution to support auto-scaling in your cloud environments. Read more
1 Review

Skies Never Looked So Good With BIG-IP Cloud Edition

DevCentral discusses the upcoming release of BIG-IP Cloud Edition and how you may benefit from scaling lightweight instances of Local Traffic Manager and Advanced WAF. Read more
2 Reviews

Getting In Shape For Summer With BIG-IP Per App Virtual Edition

What happens when you cross a developer with a fitness instructor? You get BIG-IP Per App VE. DevCentral discusses the new per-App instance of BIG-IP providing LTM and WAF functionality wherever your applications reside. Read more
1 Review

Intelligent Proxy Steering - Office365

Introduction This solution started back in May 2015 when I was helping a customer bypass their forward proxy servers due to the significant increase in the number of client connections after moving to Office365. Luckily for them, they have a... Read more
2 Reviews

Directory Traversal with Spring MVC on Windows (CVE-2018-1271)

Recently a directory traversal vulnerability in the Spring Framework was published (CVE-2018-1271). The Spring application will only be vulnerable when it is deployed on a Microsoft Windows based operating system and the application developer uses... Read more
0 Reviews

PEM: Subscriber-Aware Policy and Why Every Large Network Needs One

Previous post “PEM: Key Component of the  Next Generation University Network” provided a high-level overview of several Policy Enforcement Manager features which help K-12 Schools, Colleges and Universities transform their Networks into... Read more
2 Reviews

Remote Code Execution with Spring Data Commons (CVE-2018-1273)

In the recent days another critical vulnerability in Spring Framework was published (CVE-2018-1273). This time the vulnerable component is Spring Data Commons. Spring Data component goal is to provide a common API for accessing NoSQL and... Read more
0 Reviews