Learn F5 Technologies, Get Answers & Share Community Solutions Join DevCentral


Entries for January 2011

articleirulesadnbig-ipdevnewstechtip January 31, 2011 by Colin Walker
Client cert authentication is not a new concept on DevCentral, it’s something that has been covered before in the forums, wikis and Tech Tips.  Generally speaking it means that you’re receiving a request from a client, and want to authenticate them, as is often the case. Rather than asking for a userID and password, though, you’re requesting a certificate that only authorized clients should have access to.  In this way you’re able to allow seamless access to a resource without forcing ...
Claiming SSL is not computationally expensive is like saying gas is not expensive when you don’t have to drive to work every day.  My car is eight years old this year. It has less than 30,000 miles on it. Yes, you heard that right, less than 30,000 miles. I don’t drive my car very often because, well, my commute is a short trip down two flights of stairs. I don’t need to go very far when I do drive it’s only ten miles or so round trip to the grocery store. So from my perspective, gas isn’t real...
This week brought new meaning to the old, familiar phrase “so overstuffed with goodness it’s unknowable”. Well okay, maybe it’s a silly new phrase I just made up, but that doesn’t change the fact that this was yet another killer week for content on DevCentral. There were forum posts by the hundreds, blog posts by the dozen and tech tips a plenty. There was even some twitter inspired swan diving silliness. Through all of that I’ve picked what I thought were some of the most interesting things out...
Mobile users. cloud computing . End-runs around IT security by developers. The trend has always existed, it’s just speeding up now. IT needs to take back control – and fast. But first IT needs the tools with which to do that… Let’s ignore the horrible acting by Kevin Costner in “Robin Hood: Prince of Thieves” (I personally prefer Russell Crowe in the 2010 version but that’s me and unfortunately they cover two different periods of Robin Hood’s legendary life so we’re stuck with the lesser version...
Anyone who has worked with SOAP knows it can make a lot of things easier, but it is not without its hurdles. Interpreting complex type syntax for use with a SOAP driver can present one of the largest headaches for a web services developer. In this tech tip, we are going to walk through a few examples of complex types commonly used within the iControl SDK. Creating A Virtual Server When creating a virtual server, the LocalLB.VirtualServer WSDL will be used along with the ‘create’ method descri...
One day many years ago, Lori and I’s oldest son held up two sheets of paper and said “These two things are exactly the same, but different!” Now, he’s a very bright individual, he was just young, and didn’t even get how incongruous the statement was. We, being a fun loving family that likes to tease each other on occasion, we of course have not yet let him live it down. It was honestly more than a decade ago, but all is fair, he doesn’t let Lori live down something funny that she did before he w...
What could you do with your code in 20 Lines or Less? That's the question I ask (almost) every week for the devcentral community, and every week I go looking to find cool new examples that show just how flexible and powerful iRules can be without getting in over your head.This week I’ve got some cool forum examples including Chris Miller’s awesome example of doing a redirect, but in an interesting way that includes an iRule generated HTML page with an in-line meta refresh, some cool SSL re-encry...
Virtual Desktop Infrastructure (VDI) or the ability to deliver desktops as a managed service is an attractive and cost effective solution to mange a corporate desktop environment.  The success of virtual desktop deployments hinges on the user experience, availability and performance, security and IT's ability to reduce desktop operating expenses.  VDI deployments virtualizes user desktops by delivering them to distinctive end point devices over the network from a central location. Since the user...
articleus January 26, 2011 by Colin Walker
A bit of twitter inspired silliness for you today: Hello admins, how are you? Fantastic. Does your network run like mine? No. Can it work like mine? Yes Should you use F5 to manage your network? I don't know, do you like feeling secure? Do you want an ADC that works like a combination of an App FireWall, WAN Accelerator and App Integrator that can block bad requests at the edge of the network that it's seamlessly accelerating while dealing with business intelligence all at the same time? ...
Page 1 of 6First   Previous   [1]  2  3  4  5  6  Next   Last