Learn F5 Technologies, Get Answers & Share Community Solutions Join DevCentral


Entries for June 2012

When it comes to upgrades, implementations, migrations, etc., you can plan for months. You can test, test, and then test some more. You can cross every “i” and dot every “t”. But at the end of the day, it all comes down to the end-user experience.  Making the transition from one platform to another is as seamless as possible for your users is crucial.  When it comes to migrating from Exchange 2003/2007 to Exchange 2010, The Big-IP platform with Access Policy Man...
articleibmindustryus June 29, 2012 by Nojan Moshiri
Our friends at IBM have been supporting the SIP protocol within WebSphere Application Server since version 6.1, and at the beginning of this year we launched a joint project to bring high availability, SSL offload and health monitoring to WebSphere SIP. To be clear, WebSphere has a built-in SIP server and SIP proxy that you can deploy, without additional add-ons. Our test results were positive and through much collaboration between F5 Networks and the IBM WebSphere team, I’m pleased to announce ...
#GDI #infosec #bigdata Personalization is usually the first application mentioned for big data, but security may be of even more value to the enterprise We (as in the corporate “we”) recently postulated that it was time “time to ratchet up the protection afforded users and the business by leveraging big data in a way that enables attacks to be prevented, not just deflected or avoided.” Actually, it’s well past time we applied the tremendous amount of information that is available to defend...
I show you how to configure the IP Intelligence Service available on BIG-IP v11.2, in 5 Minutes or Less.  By identifying relevant IP addresses and leveraging intelligence from cloud-context security solutions, F5's new IP Intelligence service combines valuable information on the latest threats with the unified policy enforcement capabilities of the BIG-IP application delivery platform.   Deployed as part of the BIG-IP system, F5’s IP Intelligence service leverages data from multiple sources to e...
What could you do with your code in 20 Lines or Less? That's the question I like to ask for the DevCentral community, and every time I go looking to find cool new examples that show just how flexible and powerful iRules can be without getting in over your head. This week the wondrous bounty that is the iRules forums has been ripe with options for the avid iRules enthusiast. Whether you're looking for simple or complex, there has been plenty to delve into thanks to the killer community and the a...
Don’t ya love all the acronyms we have? So by now, you’ve probably heard that BYOD means Bring Your Own Device – a topic that is getting lots of press these days.  The concept of allowing employees to use their own personal device, often mobile, for work related tasks.  This could reduce the overall expenditure for IT issued devices and many organizations feel users are happier and more productive when they are using the device of their desire.  There could be a snag however when it comes to li...
#androidDev When an SSL enabled app isn’t, and how easy that is to implement. Remember the Maginot line and how powerful and defensive it was going to be… And then the Germans just bypassed it? Remember the West Wall, where the Allies were going to throw themselves against in the waning days of World War II… And then it was not just pierced but effectively eliminated as a protective barrier in five days of fighting? That’s what happens when you know you need a defense, and you place all of you...
#SDN brings to the fore some critical differences between concepts of control and execution While most discussions with respect to SDN are focused on a variety of architectural questions (me included) and technical capabilities, there’s another very important concept that need to be considered: control and execution. SDN definitions include the notion of centralized control through a single point of control in the network, a controller. It is through the controller all important decisio...
articlesecurityddosus June 26, 2012 by David Holmes
Last week we looked at the mechanics of the SYN-flood attack. Now let’s examine the mechanics of the countermeasures. Countermeasure: SYN-Cookies In 1996, Dan Bernstein came up with an elegant defense against the SYN-flood called SYN-cookies. SYN-cookies enable the server to respond to all SYN packets while only creating flow table entries for legitimate connections. Figure 2: Animation – SYN floods and SYN cookies The SYN-cookie does this by encapsulating three fields of the...
Early last year I blogged an update to the iRules HTTP event order that F5er John Alam put together. John is back with another update to the drawing, this time, however, including the access policy manager flow. This article will cover the APM events as well as a couple new standard events added back in 11.0. APM Event Flow There are eight events specific to the access policy manager in iRules, as well as a dozen or so commands. I’ll focus on the events in this article. Of the eight events, th...
Page 1 of 5First   Previous   [1]  2  3  4  5  Next   Last