Learn F5 Technologies, Get Answers & Share Community Solutions Join DevCentral


One time passwords, or OTP, are used (as the name indicates) for a single session or transaction.  The plus side is a more secure deployment, the downside is two-fold—first, most solutions involve a token system, which is costly in management, dollars, and complexity, and second, people are lousy at remembering things, so a delivery system for that OTP is necessary.  The exercise in this tech tip is to employ BIG-IP APM to generate the OTP and pass it to the user via an SMS Gateway, el...
In this second offering from Joe Malek’s delve into some advanced configuration concepts, and more specifically the logging and reporting world, we take a look at the vendors that he investigated, what they offer, and how they integrate with F5 products.  He discusses some of the capabilities of each, their strengths and weaknesses and some of the things you might use each for. If you’ve been wondering what your options are for more in-depth log analysis and reporting, take a look to see wh...
articlevirtualizationdevnewstechtip February 17, 2010 by Colin Walker
The already impressive flexibility and power of the BIG-IP takes a giant leap forward with the announcement of the BIG-IP LTM VE. This Virtual Edition of LTM not only allows for extremely easy trial of the technology and an easily attainable resource for local development or testing, but it also shows that no matter how many tricks LTM might have, there's likely one more around the corner. If you're like me then you're already an F5 user. I use F5 gear just about every day while wri...
For the enterprise user, Windows 7 adds a slew of new features in it's Enterprise edition including BranchCache, Federated Search, AppLocker, BitLocker, as well as the focus of this article: DirectAccess. So What Is DirectAccess? DirectAccess in Windows 7 and Windows Server 2008 R2 allows users to seemlessly and securely connect to their corporate network without the need to establish a separate VPN connection.  With a DirectAccess enabled environment, the network's file share...
The BIG-IP local traffic management system includes a feature called rate shaping which allows you to enforce a throughput policy on incoming traffic.  Throughput policies are useful for prioritizing and restricting bandwidth on selected traffic patterns.  Rate shaping can be useful for an e-commerce site that has preferred clients and would like to offer higher throughput for preferred customers, and lower throughput for other site traffic. This article will discuss how to create an...
Last week, I talked about Ruby and some of the awesome things that you can do with Ruby and iControl together. I also chatted a bit about why that's exciting to me, and gave the first of several examples of Ruby and iControl working together. This week I'll take a look at the next example in line, the Ruby Web Accelerator Policy Switcher. Why might you want a way to switch policies in an automated fashion you ask? Allow me to illuminate. Business these days moves at a pretty astonishing speed....
Ever wondered whether to use switch or if/else?  How about the effects of regular expressions?  Or even what the overhead of variables are?  We've come up with a list of the top 10 optimization techniques you can follow to write a healthier happier iRule. #1 - Use a Profile First This one seems obvious enough but we continually get questions on the forums about iRules that are already built into the product directly.  iRules does add extra processing overhead and will be ...
The BIG-IP Management GUI has a feature called the Network Map that includes a hierarchical summary of the objects on the system and their current statuses.  This tech tip follows on to my previous Local Traffic Summary article and will take that GUI component and break it down into the underlying iControl method calls and present an alternative implementation from within Windows PowerShell. Introduction The Network Map component of the BIG-IP Management GUI has two components.  ...
The BIG-IP Management GUI has a feature called the Network Map that includes a summary of the objects on the system and their current statuses.  This tech tip will take that GUI component and break it down into the underlying iControl method calls and present an alternative implementation from within Windows PowerShell. Introduction The Network Map component of the BIG-IP Management GUI has two components.  The first component is a Local Traffic Summary table that lists the Virt...
One of the many things that makes iRules so powerful is the amazing amount of flexibility that it gives you with which you can manage the user experience of your application, improve security, performance and reliability, and much more. This fine grained amount of control ensures that you are able to look out for the best interest of those accessing your application and see to it that they are getting the very best experience they can. It also gives you the control to customize that experience ...
Page 1 of 4First   Previous   [1]  2  3  4  Next   Last