Learn F5 Technologies, Get Answers & Share Community Solutions Join DevCentral


articleapmsecuritynewstechtip February 27, 2012 by Jason Rahm
Last fall I released a series of articles on configuring APM for remote desktop access: Part 1 Part 2 Part 3 These are great starter articles into the power that APM offers in presenting a user with a method to get to their desktop. But if the user just needs to get to the file system for a file, or check mail via OWA, launching the desktop is a little much.  In part one (of two) of this series, I’ll expand on the function of the webtop to include web portals and network...
articleapmsecurityadnbig-ipnewstechtip February 21, 2012 by George Watkins
Introduction Two-factor authentication (TFA) has been around for many years and the concept far pre-dates computers. The application of a keyed padlock and a combination lock to secure a single point would technically qualify as two-factor authentication: “something you have,” a key, and “something you know,” a combination. Until the past few years, two-factor authentication in its electronic form has been reserved for high security environments: government, banks, large companies, etc. The mo...
Back in October, I attended a Security B-Sides event in Jefferson City (review here). One of the presenters (@bethayoung) talked about poisoning the internal DNS intentionally for known purveyors of all things bad. I indicated in my write-up that I’d be detailing an F5-based solution, and whereas a few weeks has turned into a couple months, well, here we are. As much as I had hoped to get it all together on my own, F5er Hugh O’Donnell beat me to it, and did a fantastic job. F5er Lee Orrick also ...
iApps, introduced in v11, have a primary function in controlling the object creation and management for an application delivered by BIG-IP. As discussed previously, however, anything that can be accomplished in TMSH can be done in an iApp, so what better way to quickly generate checksums on iRules than via an iApp. New in v11.1, you can add either a checksum or a digital signature to an iRule (but not both). For iRules that have been signed or had a checksum applied, there will be a line immedia...
articlednsmanagementnewstechtip December 16, 2011 by Jason Rahm
F5 has been in the DNS business for quite some time, beginning with the 3-DNS GSLB product introduced in 1998. While steadily growing the GSLB market through product advances, the platform is incredibly feature rich now, offering far more than GSLB services. Some of the other services added over the years (articles written on services in parentheses): Standard name services via BIND, as a fallback or as primary domain auth Local SLB for DNS DNSSEC (Configuring GTM’s DNS Security ...
articleirulesaccessbig-ipdevnewstechtip December 09, 2011 by Jason Rahm
New in BIG-IP version 11.1 are iFiles, a feature that allows users to load files through tmsh or the GUI onto the BIG-IP which can be referenced from iRules. This has an immediate use case of supplanting several of our codeshare entries for sorry and/or maintenance pages delivered directly from the BIG-IP instead of redirecting to a server to handle those requests. In this tech tip, I’ll cover the command options, the GUI configuration, and finally offer up a maintenance page iRule referencing i...