Welcome to DevCentral


Community Leaderboard

Featured Articles

The RSA Conference: What Do You Want To Learn?

RSA is not just a public-key cryptosystem, it’s also the premier security conference in the world.  Let’s face it…Rivest, Shamir, and Adleman know how to take a great thing and expand it into a really great thing!  The RSA Conference ...

You named your products "Good, Better and Best?" What were you thinking?

“Funny … but really, what are the names you’re going to market with?” “I’m not presenting these to my customer. They’re too simple.” And that’s when I knew we’d gotten it right. After all, the objective for licensing is to make it simple...

A Little Love for Ops - the All New BIG-IP Operations Guide

A couple years in the making, the long sought after F5 BIG-IP TMOS: Operations Guide, hence force called the "Manual of Operational Greatness," has arrived! In addition to the great documentation on how to design and deliver traffic...

Getting FREAK-y with BIG-IP

Since it’s been about 3 months since POODLE, we’re clearly overdue for another major vulnerability in SSL and/or TLS. Fortunately for us, the research team at SmackTLS has released details of the FREAK attack (aka OpenSSL CVE-2015-0204). We...

MWC 2015 – How LTE Roaming Works (feat Nas)

Peter Nas, Sr. Solution Architect, explains what happens when the many MWC attendees from all over the world arrive in Barcelona and need to connect their mobile devices to a carrier network. Peter does a great job walking us through what happens...

Recent Articles

Enforcing CORS With LineRate

As the web became more popular web applications became more complex. When the idea of adding a scripting functionality within a web-browser was conceived the security model assumed certain things about what "secure" interaction between the browser and the web server looked like; this led to the "Same Origin Policy" (SOP). The SOP allowed browsers to decide when a script...

Routing HTTP by request headers

Dynamic network routing protocols, like BGP, allows Internet traffic to go from point A to B.  Using iControl REST we can create our own dynamic protocol to route HTTP requests from point 1 to 2. Routing by HTTP request There’s a finite number of IPv4 addresses available and an increasing number of web applications that are being deployed that consume these resources. To help...

ChefConf 2015 – Automate All Your Puns

#chefconf #f5 Chef turns infrastructure into code. It also gives the casual blog writer a terrible temptation to descend into pun-filled drivel. Which would be a shame as the ability to automate and operationalize our infrastructure has never been more relevant. That’s why I’m excited to be attending Chefconf 2015 in Santa Clara. We will be at stand T6 with a number of F5’ers eager to talk...

Beyond Scalability: Achieving Availability

Scalability is only one of the factors that determine availability. Security and performance play a critical role in achieving the application availability demanded by business and customers alike. Whether the goal is to achieve higher levels or productivity or generate greater customer engagement and revenue the venue today is the same: applications. In any application-focused business...

What does the Internet of Things mean for your business and your network?

You’ve heard of the Internet of Things (or Internet of Everything) by now, I’m sure. It’s things like your fridge telling you when you’ve run out of eggs; your shoes telling you how far you’ve travelled; your car keeping you up to date on local traffic so you know which routes to avoid; your house telling you how much water or heating is being used, that kind of thing. For businesses the...

F5 2015 網路世界預測之三 : 雲端並非生而平等

Adapted from What’s new in 2015: consumer hyperawareness, public services going digital, and a shift in the way we view clouds. 雲端重心從促進採納轉向優化   這幾年來,IT產業積極將他們的技術轉移到雲端 -...

Lost in Translation...in Italy

I've been travelling recently. To places and fields that have limited to no mobile connectivity and this can be a challenge when a challenge arises. Immediately following Mobile World Congress in Barcelona earlier this month, my family embarked on a multi-week European vacation. After spending a couple more days in Spain, we jumped on the rail to Paris for a couple days and then on to Rome...

F5 2015 網路世界預測之二 : 公眾服務轉捩點

Adapted from What’s new in 2015: consumer hyperawareness, public services going digital, and a shift in the way we view...

Whiteboard Wednesday: Global Traffic Manager Load Balancing Algorithms Part 6

Jason continues the series on Global Traffic Manager load balancing algorithms with a transition from static to dynamic load balancing algorithms. In this video, Jason covers the LDNS-based algorithms: hops, completion rate, and round trip time. Resources About Global Server Load Balancing (manual) Collecting Metrics (manual) Solution 11673 - Some BIG-IP GTM versions use data other than...

Managing Thousands of Apps

Managing Thousands of Apps As enterprises move toward both public and private cloud models, they dramatically shorten the time for an internal application owner to receive new infrastructure they request.  Typical enterprises often see server deployment times move from weeks to just a few minutes.  This newfound agility enables developers to create and deploy applications at a...

Recent Questions and Answers

Stewart 174 answered the question How to redirect url with extension?
2 hours ago Read More
KingMeow 3 asked the question Calling commands by string / reflection
2 hours ago Read More
R Marc 357 asked the question ASM Cookie Hijacking
3 hours ago Read More
Krishna R 1 asked the question How to redirect url with extension?
4 hours ago Read More
Sonny J Bonds 4 answered the question iRule Exception Help
7 hours ago Read More
dirtiPACKET 112 asked the question GTM - split dns solution
7 hours ago Read More
amolari 1095 answered the question Design BIG IP 5200V for VCMP
7 hours ago Read More
DevBabu 55 answered the question iRule Exception Help
8 hours ago Read More
More Questions »