Learn F5 Technologies, Get Answers & Share Community Solutions Join DevCentral


Outlook Web Access is the web interface to the Microsoft Exchange environment, and many customers have secured the portal behind their BIG-IP APM architecture. In looking at the OWA logon page, however, you'll notice that there are a couple extra options than the default APM logon page supports: This article will show you how to add these options to a custom BIG-IP APM logon page, however, it assumes the portal app with SSO is already configured and working. If you need help with that...
I was recently asked to develop health monitors on my 10.2.4HF3 LTMs for our Exchange 2010 environment. Two of the three monitors were a bit challenging, so I wanted to share what I developed.  The monitors have been sanitized to protect our environment - modify them to fit yours. *** Active Sync *** This monitor was challenging me, until I stumbled across this statement for versions 10.2.x and 11.x in SOL2167: "When Basic Authentication is enabled by configuring a User Name and Pas...
**Many thanks to F5's Helen Johnson  and Microsoft engineers Joe Davies and Craig Schwandt for putting this guide together!** Introduction Applications running across networks encounter a wide range of performance, security, and availability challenges. These problems cost organizations an enormous amount in lost productivity, missed opportunities, and damage to reputation. The BIG-IP product family is a system of integrated application delivery services that work together on the same be...
articleaccesseventsnewstechtip September 12, 2011 by Jason Rahm
I wrote an article several months back on auto-launching Remote Desktop sessions with APM.  With the introduction of BIG-IP APM v11, there is a new built-in capability to support a full webtop.  This means that server, desktop, or other resources can be placed on the webtop for users to select once logging in.  In this first example, I’ll set up a static internal resource for users to connect to after logging in. Create the Webtop After logging in to the BIG-IP, open up the Acce...
articleirulesdeveventsnewstechtip February 23, 2011 by Joe Pruitt
In previous articles, we have explored using the Google Chart APIs to integrate static charts and graphs with iControl and iRules to build monitoring applications. Creating An iControl PowerShell Monitoring Dashboard with Google Charts Scatter Plotting Response Times With iRules and Google Charts Fun with Hash Performance and Google Charts Monitor Your iRules Performance with iControl and Google-O-Meter Comparing iRule Control Statements Referral Tracking with iRu...
A question came up on an internal mailing list regarding getting the configuration off of the LTM into a format that can be parsed by an external tool.  In this case, the request was for an XML format of the BIG-IP configuration.  With iControl, It’s fairly simple to query configuration objects and it’s just a matter of throwing in a few print statements to build a XML document of the object hierarchy. This article will show you how to query the list of LTM virtual servers and their c...
I’ve been toying with the idea of building an iControl shell for a long time.  For those who don’t know what I’m talking about, a shell is essentially a fully enclosed application that runs within a console on your computer.  Windows has the Command Prompt and Unix has it’s various shells (sh, bash, ksh, etc) and since most of my working day involves interacting with a shell of some sort, I figured it might be useful to create an interactive BIG-IP shell. For this example, I picked Po...
Joe Malek, one of the many awesome engineers here at F5, took it upon himself to delve deeply into a very interesting but often unsung part of the BIG-IP advanced configuration world: logging and reporting. It’s my great pleasure to get to share with you his awesome study and the findings therein, along with (eventually) a toolkit to help you get started in the world of custom log manipulation. If you’ve ever questioned or been curious about your options when it comes to information gathering an...
For the enterprise user, Windows 7 adds a slew of new features in it's Enterprise edition including BranchCache, Federated Search, AppLocker, BitLocker, as well as the focus of this article: DirectAccess. So What Is DirectAccess? DirectAccess in Windows 7 and Windows Server 2008 R2 allows users to seemlessly and securely connect to their corporate network without the need to establish a separate VPN connection.  With a DirectAccess enabled environment, the network's file share...
The F5 PRO-Enabled Management Pack is configurable in several ways and allows for many different customized monitoring scenarios. This article will describe how to configure the pack to match your organization’s needs. The general configurability model is based off something similar to creating a Rule in Microsoft Outlook: When [a statistic threshold is crossed] for any pool members in [this group], respond with an [action] The bracketed terms are configurable, some more than others. I’ll des...
Page 1 of 5First   Previous   [1]  2  3  4  5  Next   Last