Learn F5 Technologies, Get Answers & Share Community Solutions Join DevCentral

Filter by:
  • Solution
  • Technology
Clear all filters

Articles

Sort results

Lightboard Lessons: SSL Visibility - The Ultimate Passive Inspection Architecture

Join DevCentral guest host David Holmes as he details the ultimate passive inspection architecture in this latest episode of Lightboard Lessons! Read more
Average Rating: 4.9
3 Reviews

Post of the Week: Blocking a Specific URI

In this "Post of the Week" video, we show how to block a specific URI using a custom ASM signature and an iRule. Read more
1 Review

DevCentral’s Featured Member for November – Nathan Britton

Nathan Britton works as a Principal Security Consultant in the UK for a security solutions provider called NTT Security, part of the NTT Group. They work with customers to design and implement security solutions and his team specializes in... Read more
1 Review

Legacy Application SSO with BIG-IP and Okta

IT organizations have a simple goal: make it easy for workers to access all their work applications from any device. But that simple goal becomes complicated when new apps and old, legacy applications do not authenticate in the same way. Today... Read more
1 Review

Nessus 6 XSLT Conversion for ASM Generic Scanner Import

Nessus 6 XSLT Conversion for ASM Generic Scanner Schema Import Read more
Average Rating: 4.9
7 Reviews

Tightening the Security of HTTP Traffic Part 3

Part 3:   Headers to remove   Server and X-Powered-by headers The Server and X-Powered-By headers:  Should be removed or changed These are added by default by some web servers such as apache, nginx, Express,…   Example:... Read more
Average Rating: 4.9
3 Reviews

Tightening the Security of HTTP Traffic Part 2

This is the second part of this article which provides guidelines for tightening the security of http traffic by leveraging the power of F5 Big-IP and  iRules to include the latest HTTP security headers to all HTTP responses. Read more
Average Rating: 4.7
5 Reviews

Tightening the Security of HTTP Traffic part 1

In this article, I will give an overview of some important headers that can be added to HTTP responses in order to improve the security web applications. Read more
Average Rating: 4.9
10 Reviews

F5 BIG-IP + Cisco Tetration: Application Centric Visibility

Extending Application Visibility and Policy Control with Cisco Tetration F5 BIG-IP Attain an End-to-End Understanding of Application Connectivity, Performance, and Security from L2–L7. Read more
0 Reviews

Load Balancing VMware Identity Manager Integration Guide is now Ready!

Learn how to deploy F5 BIG-IP LTM/APM/DNS with various VMware End-User-Computing based products. Read more
0 Reviews

Single Sign-On (SSO) to Legacy Web Apps Using BIG-IP & VMware Workspace ONE

A few months back VMware announced a joint collaborative effort on delivering even more applications to their Workspace One suite utilizing F5 BIG-IP APM to act as an authentication translator from SAML to legacy Kerberos and header-based web... Read more
0 Reviews

F5 BIG-IP MQTT protocol support and use cases in an IoT environment

F5 BIG-IP iRules allow deep understanding and decision making within the MQTT protocol. Check out some use cases and more. Read more
Average Rating: 4.9
5 Reviews

Upgrading to BIG-IQ 5.2

Interested in F5's BIG-IQ 5.2? Here is the scoop - what's in this release and what do you need to know before upgrading. Read more
0 Reviews

What is BIG-IQ?

F5's BIG-IQ centralizes management, licensing, monitoring, and analytics for your dispersed BIG-IP infrastructure. Read more
0 Reviews

AFM DoS Enhancements in BIG-IP v13

Following up on our previous article AFM Enhancements In BIG-IP v13, we'll narrow our discussion for this article to Denial-Of-Service (DoS) updates in v13. Architectural changes in BIG-IP's user interfaces allows for increased flexibility... Read more
Average Rating: 4.9
3 Reviews

AFM Enhancements in BIG-IP v13

F5 BIG-IP version 13 offers numerous improvements to Advanced Firewall Manager (AFM). Check out the discussion on DevCentral and find out more on version 13. Read more
1 Review

Cipher Rules And Groups in BIG-IP v13

DevCentral reviews Cipher Rules and Ciphers Groups in BIG-IP v13. Separating Cipher strings from SSL profiles allows us to ease cipher suite management so you can keep current with cryptographic trends and impress your friends. Read more
Average Rating: 4.9
4 Reviews

Security Trends in 2016: Known Vulnerabilities Are Still Dangerous

FINISH HIM!  SSHowDowN Wins!  The proxy attack Akamai published on last October of 2016 sound like a character from Mortal Kombat. That would be a fun MK character, a little digitized malware-bot killing Sub-Zero or Goro.  In... Read more
2 Reviews

APM Cookbook: Two-Factor Authentication using YubiKey OTP with iRulesLX.

It’s been a number of years since I penned my first DC article: Two-Factor Authentication using YubiKey, YubiCloud and APM. A lot has changed over the years, BIG-IP versions and features, new YubiKey models and the YubiCloud Validation... Read more
Average Rating: 4.9
7 Reviews

Lightboard Lessons: BIG-IP Life of a Packet

In this episode of Lightboard Lessons, Jason updates an earlier Whiteboard Wednesday with a slight change in flow introduced in TMOS version 12.1. Some of the features in this flow are only applicable if you have hardware or if you have security... Read more
Average Rating: 4.9
5 Reviews

Q/A with itacs GmbH's Kai Wilke - DevCentral's Featured Member for February

Kai Wilke is a Principal Consultant for IT Security at itacs GmbH – a German consulting company located in Berlin City specializing in Microsoft security solutions, SharePoint deployments, and customizations as well as classical IT Consulting. He... Read more
Average Rating: 4.9
3 Reviews

Lightboard Lessons: Air Gap Architectures

In this episode of Lightboard Lessons, Jason covers a couple deployment options for routing traffic through an IPS tier while maintaining source IPs. The first option compresses the external and internal legs of the air gap solution onto a single... Read more
1 Review
Average Rating: 4.9
3 Reviews

TLS Fingerprinting - a method for identifying a TLS client without decrypting

TLS fingerprinting is a methodology based on the attributes in an SSL handshake ClientHello message. This presents an interesting approach to identifying user agents without first decrypting the traffic and looking for an HTTP User-Agent header. Read more
Average Rating: 4.9
9 Reviews