Welcome to DevCentral

 

Featured Articles

Integrating Duo Security with F5 BIG-IP Access Policy Manager

Duo Security integrates into F5 BIG-IP Access Policy Manager as a full featured two factor authentication solution and offers inline self-enrollment and an interactive, user-friendly login experience that enables the user to select from a wide...

Working with MasterKeys

Author : Arnaud Fauvel (Obiane – Orange Group – France)   Introduction : As explained in “SOL9420: Installing a UCS file containing an encrypted passphrase”: Passphrases used for configuration items, such as monitors, profiles, and...

Node.js ABC’s - K is for Koa

Node.js is an open source runtime environment for server-side and network based applications.  Node.js contains all the components needed to build a functioning website.  But, you need to think of Node.js as a big tool box.  As with...

Demystifying iControl REST Part 3 - How to pass query parameters and tmsh options

iControl REST. It’s iControl SOAP’s baby, brother, introduced back in TMOS version 11.4 as an early access feature but released fully in version 11.5. Several articles on basic usage have been written on iControl REST (see the resources at the...

LogJams, DHE Parameters, and Other Obstacles to TLS Excellence

If you're presently volunteering to wear the hat of “SSL/TLS Vulnerability Manager”, then you’ve come to the realization that patching one vulnerability often raises others. In wake of revelations about mass surveillance, many of us moved...

Recent Articles

새로운 모바일, 하이브리드 세상의 접근 관리

This post is adapted from Jay Kelley's original entry.    기업 환경에 완전히 새로운 세상이 출현함에 따라 ‘새로운 표준’들과 새로운 기회가 생겨나는 반면, 기업들은 조직 전체에 전광석화처럼 다가올 새로운 도전과제들과 마주하게 되었다.  오늘 날 그리고 미래의 근무환경은 계속해서 모바일 중심으로 나아갈 것이다. 모바일 근로자의 수만큼 모바일 디바이스가 두 세배로 증가하게 될 것이라는 전망은 말할 것도 없는 명백한 사실이다. IDC가 2015년 연말에 이르면 전 세계 노동력의 37%가 모바일 근로자가 될 것이라고 분석하였고 이는 전 세계적으로 13억 명의 모바일 근로자가 올해 안에 생긴다는 뜻이다. 오렌지...

Faster Small Downloads: TCP Early Retransmit and Tail Loss Probe

I’d like to welcome you to a new blog about F5® TCP Express™ in BIG-IP® Local Traffic Manager™ (LTM). It will focus on new features and the product’s more subtle behaviors. Today I’ll discuss two improvements introduced in F5® TMOS® 11.6.0 that are meant to work together for small file transfers, or any application where the server sends out small amounts of data over TCP....

Integrating Duo Security with F5 BIG-IP Access Policy Manager

Duo Security integrates into F5 BIG-IP Access Policy Manager as a full featured two factor authentication solution and offers inline self-enrollment and an interactive, user-friendly login experience that enables the user to select from a wide range of authenticators: Duo Push, Duo Mobile, phone callback, SMS passcodes, and even hard tokens. This integration guide was built for BIG-IP Version...

Working with MasterKeys

Author : Arnaud Fauvel (Obiane – Orange Group – France)   Introduction : As explained in “SOL9420: Installing a UCS file containing an encrypted passphrase”:   Passphrases used for configuration items, such as monitors, profiles, and Secure Sockets Layer (SSL) keys, are stored in the configuration file in encrypted format. The BIG-IP system uses a hardware-key encrypted...

Microservices, State, and the Network

Does moving to stateless microservices eliminate state in the network? One of the ways to increase scalability of services – and applications – is to go “stateless.” The reasons for this are many, but in general by eliminating the mapping between a single client and a single app or service instance you eliminate the need for resources to manage state in the app (overhead) and improve the...

WhiteBoard Wednesday: Breaking Down the TLS Handshake

In this edition of WhiteBoard Wednesday, we look at the Transport Layer Security (TLS) Handshake.  TLS has become an extremely popular protocol used today, and it's important to know some of the details of how a client and server interact when using this protocol.  The TLS handshake is the initial set of transactions that happen between client and server, and this video explores...

Node.js ABC’s - K is for Koa

Node.js is an open source runtime environment for server-side and network based applications.  Node.js contains all the components needed to build a functioning website.  But, you need to think of Node.js as a big tool box.  As with any other art form, going to the tool box over and over to perform the same task is not productive.  The concept of tool reuse is used in all...

Nouveau site web F5 Networks en français

Le site web de F5 Networks est enfin disponible en français. Il est synchronisé au site US ce qui signifie que vous disposez maintenant d'un site constamment à jour sur les nouveautés, les news, les failles de sécurité du marché ... Je vous invite à y faire un tour et à revenir régulièrement : http://www.f5.com/fr  

Is 2015 Half Empty or Half Full?

With 2015 crossing the half way point, let's take a look at some technology trends thus far. Breaches: Well, many databases are half empty due to the continued rash of intrusions while the crooks are half full with our personal information. Data breaches are on a record pace this year and according to the Identity Theft Resource Center (ITRC), there have been 400 data incidents as of June...

WhiteBoard Wednesday: Virtual Server Precedence

In this video, John talks about the way the BIG-IP handles inbound connections that match more than one Virtual Server.  How does the BIG-IP decide which Virtual Server gets the connection?  Check out the video and find out!