Learn F5 Technologies, Get Answers & Share Community Solutions Join DevCentral


Introduction It is impossible to enumerate all the scenarios under which CIFS access via or by ARX may be denied. In many cases, denial of access may be the desired behavior and can sometimes be temporary. This article is intended to aid in diagnosing the cause when it is not expected. The simple answer; almost in all cases, the file server whose storage ARX is virtualizing returns this error because the entity accessing a file or file system data is not allowed access. In order to understand ...
articlestoragenewstechtip October 07, 2011 by George Watkins
Tech Tip submitted by Dave Porter, F5 Data Solutions Introduction The effectiveness of CIFS virtualization in the ARX is impaired by slow response from external systems such as file servers and domain controllers, resulting in poor response to client requests, and so-called WORKSLOW messages in syslog. Version 6.01.000 of the ARX adds new aids to diagnosing the underlying cause. Problem Statement The problem we’re solving here is one of diagnosis: ARX users complain that ‘the ARX is slow’, a...
articlenewstechtip August 12, 2011 by DataManager
Introduction This article illustrates how to create a file criteria directly through the ‘Criteria Wizard’ as well as by uploading a text file that contains the criteria. As an example we will create a criteria that will identify file names that contain characters that are not allowed in a CIFS filenames. This criteria can then be used in validated by creating an advanced report with an inventory from an NFS file system. Advanced reports and file criteria are only available in the full version o...
Introduction ARX Cloud Extender (CE) requires a proper SSL CA (Certificate Authority) from your EMC Atmos-powered cloud storage provider to ensure authenticity of the connection. For the most part, the SSL CA’s have a long life and the instructions here shouldn’t be required frequently. This Tech Tip explains the following: How to recognize this problem Steps for obtaining and installing an SSL CA from your service provider Steps for installing the SSL CA on your ARX CE system P...
Sometimes I need to log information from iRules to debug something. So I add a simple log statement, like this: when HTTP_REQUEST {   if { [HTTP::uri] equals "/secure" } {     log local0. "[IP::remote_addr] attempted to access /secure"   } } This is fine, but it clutters up the /var/log/ltm log file. Ideally I want to log this information into a separate log file. To accomplish this, I first change the log statement to incorporate a custom str...
I recently completed a successful major LTM hardware and software migration which accomplished two high-level goals: ·         Software upgrade from v9.3.1HF8 to v10.1.0HF1 ·         Hardware platform migration from 6400 to 6900   I encountered several problems during the migration event that would have stopped me in my tracks had I not (in most cases) encountered them already during my te...
articlebig-ipnewstechtip May 28, 2008 by Deb Allen
A customer recently posted about an issue they encountered when migrating an iRule from BIG-IP 4.5.x to LTM v9.x.  When traffic was sent through the iRule, the connections would be reset.  There were no errors when loading the iRule in the iRule editor or at the command line. It turns out that the syntax for the iRule was correct, but the name of a Data Group it referenced was misspelled. Both iRule editor and command line parser will display an error and fail to load the iRule for ...
Sometimes an iRule will load and run without producing any errors, but does not achieve the desired results. In this article, I will outline the basic process of examining your iRule logic against live traffic by walking through a simple example: An iRule intended to perform bi-directional HTTP Host header modifications. I recently helped a customer who had a fairly common configuration:  The webservers are configured to respond to a different domain name than the one in the URLs the ...
articlenewstechtip April 24, 2008 by Deb Allen
GTM services depend on the configuration of a listener: A network address that allows GTM to "listen" on the network for traffic it is responsible for. That address must then be used elsewhere in the configuration to define the local GTM system to itself. These configuration steps are often overlooked at first. Customers sometimes report immediately after setting up their GTM systems that they don't seem to be answering BIND queries as expected. Other customers notice other symptoms first, a...
articlevirtualizationsecurityasmnewstechtip February 26, 2008 by Deb Allen
This article details some common combinations of HTML content and WebAccelerator settings that may give unexpected results, and makes some recommendations to resolve them. (Technical details provided by Mr. Patrick Chang, WAI (WebAccelerator Illuminatus) and valued member of F5's West Coast Field Services team. Thanks, Pat!) 1.   Content is re-validated before Maximum Age is reached Look at:   Lifetime rules and Maximum Age The WebAccelerator Cache settings are ...
Page 1 of 2First   Previous   [1]  2  Next   Last