Welcome to DevCentral

 

Featured Articles

Integrating Duo Security with F5 BIG-IP Access Policy Manager

Duo Security integrates into F5 BIG-IP Access Policy Manager as a full featured two factor authentication solution and offers inline self-enrollment and an interactive, user-friendly login experience that enables the user to select from a wide...

Working with MasterKeys

Author : Arnaud Fauvel (Obiane – Orange Group – France)   Introduction : As explained in “SOL9420: Installing a UCS file containing an encrypted passphrase”: Passphrases used for configuration items, such as monitors, profiles, and...

Node.js ABC’s - K is for Koa

Node.js is an open source runtime environment for server-side and network based applications.  Node.js contains all the components needed to build a functioning website.  But, you need to think of Node.js as a big tool box.  As with...

Demystifying iControl REST Part 3 - How to pass query parameters and tmsh options

iControl REST. It’s iControl SOAP’s baby, brother, introduced back in TMOS version 11.4 as an early access feature but released fully in version 11.5. Several articles on basic usage have been written on iControl REST (see the resources at the...

LogJams, DHE Parameters, and Other Obstacles to TLS Excellence

If you're presently volunteering to wear the hat of “SSL/TLS Vulnerability Manager”, then you’ve come to the realization that patching one vulnerability often raises others. In wake of revelations about mass surveillance, many of us moved...

Recent Articles

Faster Small Downloads: TCP Early Retransmit and Tail Loss Probe

I’d like to welcome you to a new blog about F5® TCP Express™ in BIG-IP® Local Traffic Manager™ (LTM). It will focus on new features and the product’s more subtle behaviors. Today I’ll discuss two improvements introduced in F5® TMOS® 11.6.0 that are meant to work together for small file transfers, or any application where the server sends out small amounts of data over TCP....

Integrating Duo Security with F5 BIG-IP Access Policy Manager

Duo Security integrates into F5 BIG-IP Access Policy Manager as a full featured two factor authentication solution and offers inline self-enrollment and an interactive, user-friendly login experience that enables the user to select from a wide range of authenticators: Duo Push, Duo Mobile, phone callback, SMS passcodes, and even hard tokens. This integration guide was built for BIG-IP Version...

Working with MasterKeys

Author : Arnaud Fauvel (Obiane – Orange Group – France)   Introduction : As explained in “SOL9420: Installing a UCS file containing an encrypted passphrase”:   Passphrases used for configuration items, such as monitors, profiles, and Secure Sockets Layer (SSL) keys, are stored in the configuration file in encrypted format. The BIG-IP system uses a hardware-key encrypted...

Microservices, State, and the Network

Does moving to stateless microservices eliminate state in the network? One of the ways to increase scalability of services – and applications – is to go “stateless.” The reasons for this are many, but in general by eliminating the mapping between a single client and a single app or service instance you eliminate the need for resources to manage state in the app (overhead) and improve the...

WhiteBoard Wednesday: Breaking Down the TLS Handshake

In this edition of WhiteBoard Wednesday, we look at the Transport Layer Security (TLS) Handshake.  TLS has become an extremely popular protocol used today, and it's important to know some of the details of how a client and server interact when using this protocol.  The TLS handshake is the initial set of transactions that happen between client and server, and this video explores...

Node.js ABC’s - K is for Koa

Node.js is an open source runtime environment for server-side and network based applications.  Node.js contains all the components needed to build a functioning website.  But, you need to think of Node.js as a big tool box.  As with any other art form, going to the tool box over and over to perform the same task is not productive.  The concept of tool reuse is used in all...

Nouveau site web F5 Networks en français

Le site web de F5 Networks est enfin disponible en français. Il est synchronisé au site US ce qui signifie que vous disposez maintenant d'un site constamment à jour sur les nouveautés, les news, les failles de sécurité du marché ... Je vous invite à y faire un tour et à revenir régulièrement : http://www.f5.com/fr  

Is 2015 Half Empty or Half Full?

With 2015 crossing the half way point, let's take a look at some technology trends thus far. Breaches: Well, many databases are half empty due to the continued rash of intrusions while the crooks are half full with our personal information. Data breaches are on a record pace this year and according to the Identity Theft Resource Center (ITRC), there have been 400 data incidents as of June...

WhiteBoard Wednesday: Virtual Server Precedence

In this video, John talks about the way the BIG-IP handles inbound connections that match more than one Virtual Server.  How does the BIG-IP decide which Virtual Server gets the connection?  Check out the video and find out!  

新行動化混合世界的存取控制

This post is adapted from Jay Kelley's post here.        企業正跨入一個嶄新的世界。許多新的典範和「淘金熱潮」般的新機會出現在眼前,但同時也伴隨著新的挑戰,它們如同閃電般的貫穿企業組織。   今天乃至於未來的工作人口仍將繼續朝行動化發展。根據IDC調查,全球37%工作人口將在2015年底邁入行動化。這相當於全球有13億行動工作者,當然行動裝置數量將是這個數字的二或更多倍。再者,Orange Business Services報告指出,到了2018年,全球55%的商業IP流量將屬於行動商業網際網路流量。行動化時代已來臨,並且將繼續存在。   IDC預期亞太地區的攜帶自有裝置(bring your own device;...