Learn F5 Technologies, Get Answers & Share Community Solutions Join DevCentral

Filter by:
  • Solution
  • Technology

Articles

Sort results

Installing, Configuring and Running Tempest tests against Openstack

You first need to install Tempest. For that You can create a virtual environment:  pip install virtualenv # Change to a directory where virtual environments directories can be created. virtualenv ... Read more
0 Reviews

F5 OpenStack Testing Methodology

Why We Test The importance of testing in software development cannot be understated. Why testing is important is the subject of hundreds of books, blog posts and PowerPoint presentations. The F5 OpenStack development team has bought into the idea... Read more
0 Reviews

F5 Tempest Plugin and Writing Tempest Tests

Note: This is not a primer on Tempest testing. For more information on Tempest, see their official documentation. Much of the information that follows was taken from the Tempest Test Plugin Interface guide. The content here is focused on how to... Read more
1 Review

iRule Recipe 1: Single URL Explicit Redirect

Series Introduction In my experience, there are relatively few people who have extensive experience with Tcl. Since iRules is a Tcl dialect, that means that finding a solid iRules solution can be challenging, even for otherwise experienced... Read more
1 Review

F5 DevOps Libraries – Simplify BIG-IP Provisioning, Reset, and HA Pairing

We are pleased to announce availability of new lightweight DevOps Libraries designed to simplify automated provisioning, factory resetting, and basic HA clustering of BIG-IPs, both physical and virtual. Delivered as iApps LX RPMs, these libraries... Read more
1 Review

Agility 2016 Lab Day Course Content

Agility 2016 Lab Day had quite the offering of courses this year! Each course’s lab materials are linked below. Note that the lab guides are provided as is, there is no access to the environments mentioned in the guides. Programmability Cooking... Read more
2 Reviews

Extending the capabilites of the F5 vRealize Orchestrator Plug-in

Blue Medora in partnership with F5 Networks developed a vRealize Orchestrator plug-in.  This plug-in allows you to automate and orchestrate many of the operations on a F5 BIG-IP.   As part of the plug-in we have included over 50... Read more
0 Reviews

Lightboard Lessons: Secure & Optimize VDI

Virtualization continues to impact the enterprise and how IT delivers services to meet business needs. Desktop Virtualization (VDI) offers employees anywhere, anytime, flexible access to their desktops whether they are at home, on the road, in the... Read more
Average Rating: 5.0
3 Reviews

Comment les institutions françaises peuvent se protéger contre la cybercriminalité

Les institutions financières sont la première cible des cybercriminels et exposent le plus de données sensibles sur Internet. Un compte utilisateur d’une institution financière héberge à la fois de la donnée... Read more
0 Reviews

Lock Down Your Login

Last week we talked about WebSafe and how it can help protect against phishing attacks with a little piece of code. This is important since malware can steal credentials from every visited web application from an infected machine. This time we’re... Read more
1 Review

APM Cookbook: Modify LDAP Attribute Values using iRulesLX

Introduction Access Policy Manager (APM) does not have the ability to modify LDAP attribute values using the native features of the product. In the past I’ve used some creative unsupported solutions to modify LDAP attribute values, but with the... Read more
Average Rating: 3.3
3 Reviews

F5 BIG-IP Edge Client Now Supported in Apple macOS Sierra and iOS 10

F5 BIG-IP Edge Client and other F5 BIG-IP Access Policy Manager (APM) client features are now supported in Apple macOS Sierra (10.12) as of Tuesday, September 20, 2016 – the same day as the macOS Sierra was released! AND, BIG-IP Edge Client also supports Apple iOS 10 as of September 13, 2016 – the same day as it was released! Read more
0 Reviews

Get Your Git Tips Right Here!

Yes, baseball season is winding down, but I’m always nostalgic for an evening with 45000 of my closest friends at Busch Stadium here in St Louis. But enough about baseball-I’m not here to offer you overpriced ballpark food and beverages, but... Read more
0 Reviews

APIs are not Web Pages

Even though web pages might be built from APIs, they are not the same. There’s a tendency, particularly for networkers, to classify applications by the protocols they use. If it uses HTTP, it must be a web app. The thing is that HTTP has become... Read more
2 Reviews

Lightboard Lessons: DNS Scalability & Security

The Domain Name Service (DNS) is one of the most important components in networking infrastructure, enabling users and services to access applications by translating URLs (names) into IP addresses (numbers). Because every icon and URL and all... Read more
2 Reviews

Don’t Take the Impostor’s Bait

Phishing has been around since the dawn of the internet. The term was first used in an AOL Usenet group back in 1996 but it wasn’t until 2003 when many baited hooks and lures started dropping. Popular transaction destinations like PayPal and eBay... Read more
0 Reviews

Lightboard Lessons: F5 BIG-IP Virtual Edition Lab Configuration

In this episode of Lightboard Lessons, I walk through my personal lab configuration on my Mac, utilizing VMware Fusion to deploy the F5 BIG-IP Lab Virtual Edition along with a few Ubuntu LAMP servers and a shopping cart VM for ASM testing. Fusion... Read more
1 Review

Liegt die IT-Sicherheit in der Verantwortung der Endgerätenutzer?

Die Meldungen über Angriffe, Phishing-Attacken und vielen anderen IT-Sicherheitslöchern reißen nicht ab.  Laut einem aktuellen Bericht der FAZ über Hackerangriffe auf deutsche Banken, werden bei den heutigen Angriffen... Read more
0 Reviews

750th Blog Spectacular - Lessons of the LightBoard

I recently built out a LightBoard Studio for my home office so I can start contributing to the awesome LightBoard Lessons on DevCentral. These are short, informative videos explaining various technologies and often, how to implement on a BIG-IP... Read more
2 Reviews

Azure Security Center - How to protect your Web Applications in Azure

Azure Security Center allows you to asses your security in Azure. To do so, Azure Security Center can advise you on several layers : - Network Security - Application Security - Rest of the security For the Application layer security, Azure... Read more
1 Review

APM Cookbook: Okta MFA Integration

Example of leveraging F5 APM and Okta MFA for multi-factor authentication to legacy apps. Read more
0 Reviews

Contributing to Github Projects

A few months ago F5 released a python-based SDK for the iControl REST interface. I have mostly used iControl REST by building my own functions for working with the BIG-IP and including along with the core logic of my particular task. But the SDK... Read more
Average Rating: 5.0
5 Reviews

Clash of Ops: How Security turns Stateless into Stateful

It was a Monday. I was reading the Internet. Okay, I was skimming feeds. Anyway, I happened across a title that intrigued me, “Stateful Apps and Containers: Squaring the Circle.” It had all the right buzzwords (containers) and mentioned state,... Read more
Average Rating: 5.0
3 Reviews

Lightboard Lessons: WebSafe and MobileSafe

The Web, while convenient and necessary for business, can be a dangerous and scary place. The good news is that F5 offers a security solution called WebSafe.     Related Resources: Read more
1 Review

Umdenken der IT-Sicherheit – keine Einladung für Hacker

Laut einem aktuellen Bericht der Zeit plädiert Arne Schönbohm, BSI-Präsident für einen konsequenten Schutz von Cyberangriffen. „Wir können Cyberangriffe stoppen und IT-Systeme so fit machen, dass es zu keinen Auswirkungen... Read more
0 Reviews