Learn F5 Technologies, Get Answers & Share Community Solutions Join DevCentral


articleadnbig-ipnewstechtip May 31, 2013 by Jason Rahm
SyntaxHighlighter.all();Two-factor authentication (hereafter 2FA) has been a staple in enterprise VPN environments for quite some time, but it is really taking off in the web application space now as well with services riding on smart phones like Google Authenticator and YubiCloud, which we've built solutions for before in George Watkin's Google Authenticator with BIG-IP APM and Brett Smith's Yubikey Authentication with BIG-IP APM.  This solution borrows from Brett's in that it uses the sam...
articlestoragenewstechtip February 22, 2012 by Jim McCarron
Summary Deciding the optimal points to import a customer’s NetApp filer can be challenging. Ideally the ARX should import at the highest point possible on the filer in order to keep the total ARX Managed Volume count low. On a NetApp filer the highest possible point would be the volume level. For various technical reasons, which will be discussed below, importing at the NetApp volume level is restricted to a limited set of configurations and should only be used if all technical requirements ar...
articleapmsecurityadnbig-ipnewstechtip February 21, 2012 by George Watkins
Introduction Two-factor authentication (TFA) has been around for many years and the concept far pre-dates computers. The application of a keyed padlock and a combination lock to secure a single point would technically qualify as two-factor authentication: “something you have,” a key, and “something you know,” a combination. Until the past few years, two-factor authentication in its electronic form has been reserved for high security environments: government, banks, large companies, etc. The mo...
articleirulesbig-ipdevnewstechtip February 13, 2012 by Colin Walker
F5 uses Tcl as the interpreter for iRules. Many people often ask why that is. This questions is usually followed up by an immediate, "Why not Perl?" or "Why not Java" or "Why not <fill in my preferred language of choice>?". I understand the question, and frankly I'm a Perl guy from way back myself, so when I first landed at F5 and started devouring all things iRules, I was curious about the same thing. Since then I've discussed this topic with some of F5's best, in my opinion, and have com...
Introduction Virtually every dynamic site on the Internet these days makes use of a CAPTCHA in some fashion. A CAPTCHA is used to verify that a human is driving the interaction with a particular  function on a site. A CAPTCHA in its simplest form involves an end-user copying the text from an image to a text field. If the user-entered text matches that of the image, the user is allowed access to the requested resource. Variations to the classic CAPTCHA can involve doing simple math, solving...
Introduction Earlier this year Google released their time-based one-time password (TOTP) solution named Google Authenticator. A TOTP is a single-use code with a finite lifetime that can be calculated by two parties (client and server) using a shared secret and a synchronized clock (see RFC 4226 for additional information). In the case of Google Authenticator, the TOTP are generated using a software (soft) token on a mobile device. Google currently offers applications for the Apple iPhone, And...
articleirulesbig-ipdevnewstechtip December 08, 2011 by George Watkins
Introduction Anyone that's done any amount of programming has probably encountered Base64 encoded data. Data that is encoded with Base64 has the advantage of being composed of 64 ASCII characters, which makes it portable and readable with virtually any RFC-compliant decoder. Before Base64 became the de facto encoding standard for content, Base32 was the preferred method. Base32 offers three distinct advantages over Base64: it is case-insensitive, commonly confused characters have been removed...
articleadnbig-ipnewstechtip November 17, 2011 by George Watkins
Introduction Recently there was a forum post regarding using the exponential backoff algorithm to prevent or at the very least slow down dictionary attacks. A dictionary attack is when a perpetrator attacks a weak system or application by cycling through a common list of username and password combinations. If were to leave a machine connected Internet with SSH open for any length of time, it wouldn’t take long for an attacker to come along and start hammering the machine. He’ll go through his l...
articlestoragenewstechtip October 13, 2011 by Reinhard Frumm
Introduction This script imports existing Netapp Snapshots (hourly, nightly or weekly) into an ARX Managed Volume (for CIFS). The script reads the existing snapshots on the filer and generates an ARX command line script to incorporate the filer based snapshots into an existing ARX Managed Volume. Then clients can access snapshots via CIFS that were created before ARX was installed. What the Script Does The ARX Managed Snapshot feature can present snapshots, checkpoints, and volume shado...
articleirulesdevnewstechtip September 07, 2011 by George Watkins
Introduction One of the most commonly requested features for iControl we’ve seen recently has been for transaction support. It was implemented in TMSH for Version 10 and is now available for iControl in Version 11. Transactions are super handy and anyone who has used them on other networking devices or databases can attest to their usefulness. There are many occasions where we want to make large sweeping changes, but want to interrupt the changes if any of them fails. This ensures that any chan...
Page 1 of 24First   Previous   [1]  2  3  4  5  6  7  8  9  10  Next   Last