Learn F5 Technologies, Get Answers & Share Community Solutions Join DevCentral

Filter by:
  • Solution
  • Technology
Clear all filters

Articles

Sort results

iRules Recipe 4: Static Maintenance Page

You wish to provide a static maintenance splash page when all members of a pool serving a Virtual Server are currently down or disabled. This recipe provides a few approaches to accomplishing that. Read more
Average Rating: 5.0
3 Reviews

Mirai Strikeback - an iRule to kill IoT Bot Processes from your F5

An explanation of the mirai-strikeback iRule. The iRule sends an exploit back to Mirai bot processes and kills them. Use at your discretion. Read more
Average Rating: 5.0
4 Reviews

Caching for Faster APIs

Pop quiz: Do you know what the number one driver cited in 2016 for networking investments was? No peeking!   If you guessed speed and performance, you guessed right. If you guessed security don’t feel bad, it came in at number two, just... Read more
0 Reviews

Q/A with ExITeam’s Security Engineer Stanislas Piron - DevCentral's Featured Member for October

Stanislas Piron is a Security Engineer for ExITeam. 16 years ago, Stanislas started out with Firewalls, email and Web content security. His first F5 deployment was with LTM and Link Controller 10 years ago and he is DevCentral’s Featured Member... Read more
Average Rating: 5.0
4 Reviews

iRules Recipe 3: Pool and SNAT Selection by Host Header Value

The Problem You manage a number of web sites, and they are spread across servers in several different pools. You want to use a single public IP for all of these, so you need to make a pool selection based on the incoming Host header value.... Read more
0 Reviews

iRules Recipe 2: Transparent Request Target Rewriting

An iRule recipe for rewriting the Request Target (aka, Request-URI) and request Host transparently between client and server. Read more
1 Review

iRule Recipe 1: Single URL Explicit Redirect

Series Introduction In my experience, there are relatively few people who have extensive experience with Tcl. Since iRules is a Tcl dialect, that means that finding a solid iRules solution can be challenging, even for otherwise experienced... Read more
2 Reviews

Risk Remediation And The Power Of iRules

Adding to the built-in security features of the BIG-IP platform, you can take advantage of an easy-to-use scripting language to customize security for your specific environment. Based on TCL and JavaScript (iRules LX), iRules enables you to select how you route, redirect, reject, intercept, inspect, transform, and basically control all inbound or outbound application traffic Read more
1 Review

Where you Rate-Limit APIs Matters

Seriously, let’s talk about this because architecture is a pretty important piece of the scalability puzzle.   Rate limiting is not a new concept. We used to call it “quality of service” to make it sound nicer, but the reality is that when... Read more
1 Review

APM Cookbook: AutoLaunch SAML Resources

Introduction After the SAML labs at Agility I got a lot of questions about how to automatically launch SAML resources and skip the webtop, and I promised I'd write it up for you. If you haven't been to Agility, check it out next year,... Read more
2 Reviews

HEIST Vulnerability – Overview and BIG-IP Mitigation

An interesting topic was talked about in the recent Black Hat conference. It is a new attack called HEIST (HTTP Encrypted Information can be Stolen through TCP-windows) which demonstrates how to extract sensitive data from any authenticated... Read more
Average Rating: 5.0
7 Reviews

A Catch from the Codeshare: Provisioning IOS for Exchange Active Sync

On the side of the road in northern Missouri just north of Mark Twain’s stomping grounds, there is a slice of hillside removed just to the side of the highway. In Arkansas, there’s a nondescript field tucked away in a state park. Short of word of... Read more
1 Review

HTTPoxy - AGAIN??!!??

How to mitigate the HTTPoxy vulnerability using your F5 BIGIP. CVE-2016-5385, CVE-2016-5386, CVE-2016-5387, CVE-2016-5388, CVE-2016-1000109, CVE-2016-1000110 Read more
Average Rating: 5.0
3 Reviews

Codeshare Challenge: And the Winners Are...

Leading into June’s Programmability Month, we announced a codeshare challenge contest, where DevCentral community members could contribute a solution (or several) that they’ve created to solve problems in their environments. We had a lot of great... Read more
2 Reviews

Q/A with Yann Desmarest - DevCentral's Featured Member for July

Yann Desmarest is the Innovation Center Manager at e-Xpert Solutions SA and one of DevCentral’s top contributors. e-Xpert Solutions SA is a F5 Gold Partner, Unity Partner Support and a Guardian Partner. Yann has been a BIG-IP administrator for 6... Read more
Average Rating: 5.0
3 Reviews

F5 Programmability for Eclipse - Installation Instructions

It’s been a long time coming, but I’m pleased to announce a brand new editor for your iRules: F5 Programmability for Eclipse! This editor supports iRules & iRules LX in its initial release, but stay tuned for more features down the road. One... Read more
Average Rating: 5.0
3 Reviews

June is Programmability Month!

We’ve expanded over the years to include systems, configuration, advanced modules, security, etc, but programmability has historically been the bread and butter of what we do. Given the success we had with February’s security month, this... Read more
2 Reviews

Programmability Month: "The More You Code" PSAs

Years back, NBC had these public service announcements, or PSAs, on a range of subjects, delivered by their on-air talent. The series was branded “The More You Know.” One of their flagship comedies “The Office” then turned this into their... Read more
2 Reviews

Advanced iRules: Tables

We’ve covered quite a bit of ground in the Getting Started with iRules and Intermediate iRules series. In this series, we’ll dive even deeper down the rabbit hole, starting with the table command. This article is a primer for the power of tables,... Read more
0 Reviews

Advanced iRules: Scan

Scan is used to parse out strings. It takes a string and based on your format parameters, stores the matches in one or more variables. It also returns the number of conversions performed, so it can be used in a conditional as well. For all the... Read more
0 Reviews

Advanced iRules: Binary Scan

The binary scan command, like the scan command covered in this Advanced iRules series, parses strings. Only, as the adjective indicates, it parses binary strings. In this article, I’ll highlight the command syntax and a few of the format string... Read more
0 Reviews

Advanced iRules: Regular Expressions

A regular expression or regex for short is essentially a string that is used to describe or match a set of strings, according to certain syntax rules. Regular expressions ("REs") come in two basic flavors: extended REs ("ERE"s)... Read more
0 Reviews

Intermediate iRules: Validating Your Logic

Sometimes an iRule will load and run without producing any errors, but does not achieve the desired results. In this article, I will outline the basic process of examining your iRule logic against live traffic by walking through a simple example:... Read more
0 Reviews

Intermediate iRules: Handling Strings

To say we’re getting to the heart of the matter, dealing with string commands and parsing, re-arranging and modification, would almost be saying it too lightly…understating. String manipulation is a massive part of iRules, and is in fact a solid... Read more
0 Reviews

Intermediate iRules: Data-Groups

For this article in the Intermediate iRules series we’ll begin arming you with some knowledge on data-groups. As such, this article will endeavor to answer the following: What is a data-group? What is a class? What are the benefits of a... Read more
0 Reviews