Learn F5 Technologies, Get Answers & Share Community Solutions Join DevCentral


articleadnbig-ipnewstechtip May 31, 2013 by Jason Rahm
SyntaxHighlighter.all();Two-factor authentication (hereafter 2FA) has been a staple in enterprise VPN environments for quite some time, but it is really taking off in the web application space now as well with services riding on smart phones like Google Authenticator and YubiCloud, which we've built solutions for before in George Watkin's Google Authenticator with BIG-IP APM and Brett Smith's Yubikey Authentication with BIG-IP APM.  This solution borrows from Brett's in that it uses the sam...
  DevCentral uses WhiteHat Security's Sentinel service in our application development lifecycle as well as for production compliance. Beyond the direct benefits of improving our SDLC practices and reducing our window of exposure, F5 Networks and WhiteHat Security offer an integrated solution utilizing their tools and BIG-IP Application Security Manager with context-aware, adaptive, and instant virtual patching. Read here for more information on the solution overview. We recently elimi...
articledesignbig-ipnewstechtip May 01, 2013 by John Wagnon
The DevCentral team recently developed a solution for a routing traffic to a specific server based on the URI path.  A BIG-IP Local Traffic Manager (LTM) sits between the client and two servers to load balance the traffic for those servers.   The Challenge: When a user conducts a search on a website and is directed to one of the servers, the search information is cached on that server.  If another user searches for that same data but the LTM load balances to the other server, the ...
Note: As of 11.4, WebAccelerator is now a part of BIG-IP Application Acceleration Manager. This is article eight of ten in a series on DevCentral’s implementation of WebAccelerator. Join Colin Walker and product manager Dawn Parzych as they discuss the ins and outs of WebAccelerator. Colin discusses his take on implementing the technology first hand (with an appearance each from Jason Rahm and Joe Pruitt) while Dawn provides industry insight and commentary on the need for various optimiza...
F5er Harry Kleinbourg came up with a great solution for monitoring the availability of BIG-IP APM targets not just based on the availability of the virtual service but also on its ability to handle service based on the licensed session limits. Goals The goal of this solution is for BIG-IP GTM to redirect SSL VPN users to an available BIG-IP APM. The BIG-IP APM must be considered down if the number of users reaches the license limit. However, there is not an existing built-in monitor that allow...
articlebig-ipdevnewstechtip January 29, 2013 by Jason Rahm
The IP::tos command has been around since the v4 days, and there has been some confusion on IP tos versus DSCP. The command takes the supplied value (or returns  a value) and applies to the tos field overall, which is eight bits. So if you take express forwarding, which is DSCP 46 and use IP::tos 46, you'll notice on the wire that something is amiss: What gives? Well, the DSCP markings are in the first 6 bits of the tos field, so you need to bit-shift to the left a couple places. Tha...
articleirulesbig-ipdevnewstechtip December 21, 2012 by Jason Rahm
I had the privilege of watching an exercise in string handling unfold on an internal list recently that should have its day in the community. The Problem URLs for this particular application arrive in this format: /session/636971/abcd/hlsa/dcwiuh/index.html /session/128766/ssrg/hlsb/yuyt/yutyu/index.html /session/128766/dwlmhlsb/ewfwef/index.html /session/122623/wqs/wedew/mhlsb/ewfwef/uiy/index.html The useful data to extract exists between /session/[nnn] and index.html, so the final data...
articleirulesbig-ipdevnewstechtip December 11, 2012 by Colin Walker
F5 is the creator of and home to many different, powerful technologies. We offer some of the most powerful, advanced application delivery technology in the world. As with any advanced technology, however, there are often times terms and names flying around in documentation, publications or online communities that aren’t necessarily part of your daily speech. Until you’re a bit “in the know” some of these things can be confusing or even daunting. As such, we’ve gone ...
Introduction iRules are a powerful tool in the F5 administrators arsenal. They allow administrators to adapt and customize the F5 to their needs. They provide extensive power for security engineers as well. We’ve decided it’s time to revisit the Security iRules 101, with updated content, and 100% more monkeys! In section 4 of the series, let’s talk about DNS.  Domain Name System is the address book of the internet.  Any time you type letters into a browser and hit e...
Everyone has surely (don’t call me Shirley!) at least been exposed to THE CLOUD by now.  Whether it’s the—I’ll go with interesting—“to the cloud!” commercials or down in the nuts and bolts of hypervisors and programmatic interfaces for automation, the buzz has been around for a while. One of F5’s own, cloud computing expert and blogger extraordinaire (among many other talents) Lori MacVittie, weighs in consistently on the happenings and positi...
Page 1 of 26First   Previous   [1]  2  3  4  5  6  7  8  9  10  Next   Last