Learn F5 Technologies, Get Answers & Share Community Solutions Join DevCentral

Choosing between BIG-IP and LineRate isn't as difficult as it seems.... Our recent announcement of the availability of LineRate Point raised the same question over and over: isn't this just a software-version of BIG-IP? How do I know when...
A couple days ago an iRule was published that mitigates Microsoft’s HTTP.sys vulnerability described in CVE-2015-1635 and MS15-034. It’s a short rule, but it features the dreaded regex. Every time I get the chance at user groups, conferences,...
Node.js has it's basis in asynchronous programming. Also known as Event-driven programming, asynchronous development gives the programmer a way to write a program in such a way as to not block the progress of the program while waiting for a...
I give a preview of RSA 2015, running April 20 – 23 in San Francisco’s Moscone Center. F5 will showcase a number of solutions that help organizations defend against the threats to their data and protect the perimeter. Visit us in Booth 1515 to...
Traditional network firewalls (Layer 3-4) do a great job of preventing outsiders from accessing internal networks. But, these firewalls offer little to no support in the protection of application layer traffic.  Attack vectors today are being...
In 2014, the charismatic leader of one of the world’s largest democracies, who won the presidency with promises of change and savvy use of social media, turned to the Internet to crowdsource his Cabinet – inviting average citizens to provide input...
As more information becomes available regarding the recently published Range vulnerability affecting Microsoft platforms (see MS15-034and CVE-2015-1635), you can start mitigating your backend applications using the following iRule that...
Using the LineRate Node.js engine to mitigate HTTP Range header attacks on backend systems The latest details are emerging about a Range header vulnerability in Microsoft IIS (see MS15-034 and CVE-2015-1635). There have been other previou...
A critical vulnerability
In this video, John covers the concept of Virtual Server Score.  It's one of the dynamic global load balancing algorithms on the BIG-IP Global Traffic Manager.  Stay tuned for more exciting global load balancing videos next week! ...
At F5, I often think of the old BASF slogan “We don’t make a lot of the products you buy, we make a lot of the products you buy better.” And so it is with BIG-IP and applications. F5 doesn’t make the applications you use, F5 makes the applications...
There is an increasing need to deploy SSL sites (SPDY, HTTP/2, and SSL Everywhere). Traditional SSL sites require deploying one SSL certificate per site. This gets very expensive ordering and maintaining many SSL certificates. Consolidating SSL...
”Things” and the applications/services that support them are changing the way we live. Wearables in the sports and health sectors will grow to nearly 170 million devices by 2017 — an annual growth rate of 41 percent. Specific to the enterprise, if...
Le meilleur moyen de se protéger des attaques est de les contrer au plus proche - c'est à dire au moment de l'initialisation de la connection (plus communément appelé le 3-Ways-Handshake).   F5 Networks propose...
Why WAF as-a-service makes more sense every year.
Web application security. Everyone knows how important it is (and if they don't, they should) and yet the complexity of managing services that provide it often result in, shall we say, less than holistic coverage of applications. At least tha...
79% of new products miss their launch date. That was the conclusion of a CGT/Sopheon Survey in which the impact of such market misses were also explored. What it didn't dig into was the reason why so many products and projects miss their...
이 글은 아시아태평양지역에서의 클라우드에 대하여 살펴보는 시리즈의 다섯 번째이자 마지막 글이다. 이 시리즈는 지역 내 클라우드의 현주소, 클라우드가 어떻게 사용되고 있는지, 무엇이 클라우드가 더 확산되는 것을 막고 있는지, 그리고 클라우드가 어떻게 혁신을 위해 사용될 수 있는지에 대해 알아볼 것이며, 또한 FSI (금융 및 증권업계) 에서의 클라우드에 대해서도 점검해 보겠다. 본 시리즈의 전편에서 우리는 아시아태평양지역 내 클라우드의 현...
The Internet of Things (IoT) refers to the set of devices and systems that interconnect real world sensors and actuators to the internet. This includes many different types of systems, including: Mobile devices Smart meters & objects ...
In this episode of Whiteboard Wednesday, John covers the CPU, packet rate, kilobytes/s, and VS capacity dynamic load balancing algorithms for F5 BIG-IP Global Traffic Manager.    
Introduction Everything starts with a DNS request. So why not use it to protect the client? With the recent addition of Secure Web Gateway Services to the F5 line up of modules in TMOS 11.5, it provided the ability to access a URL Categorization...
Please find the English language post from which this was adapted here. 이 글은 아시아태평양지역에서의 클라우드에 대하여 살펴보는 시리즈의 네 번째 글이다. 이 글에서는 지역 내 클라우드의 현주소, 클라우드가 어떻게 사용되고 있는지, 무엇이 클라우드가 더 확산되는 것을 막고 있는지, 그리고 클라우드가 어떻게 혁신을 위해 사용될 수 있는지에 대해 알아볼 것이며, 또한 FSI...
It's not just apps that are decomposing, it's the network, too. The network is bifurcating. On the one side is rock solid reliability founded on the premise of permanence and infrequent change. On the other is flexibility borne of...
No, not the head-banging, gritty,heavy metal Metallica song (though that's certainly awesome too.. excuse me for a moment while I turn it up to 11) but the Puppet as in automation kind of master. The importance placed on APIs - which are key...
If you have anything to do with developing products or working in IT helping to deploy and run them, chances are you have heard the term "DevOps" in one form or another. Just like the ubiquitous "Cloud" floating out in the Internet somewhere, DevOps has become a catch-all phrase for anything that is Developer or Operations related.