Learn F5 Technologies, Get Answers & Share Community Solutions Join DevCentral

Filter by:
  • Solution
  • Technology
Clear all filters

Articles

Sort results

Lightboard Lessons: What are Bots?

In this Lightboard Lesson, I light up some #basics about internet bots and botnets. Humans account for less than 50% of internet traffic and the rest is spread between the good bots and bad ones. ps Related: The Facts about Botnets The state of... Read more
2 Reviews

Selective Compression on BIG-IP

BIG-IP provides Local Traffic Policies that simplify the way in which you can manage traffic associated with a virtual server. You can associate a BIG-IP local traffic policy to support selective compression for types of content that can benefit... Read more
0 Reviews

What is HTTP Part VI - HTTP Profile Enforcement Settings

In last week’s article in the What is HTTP? series, we covered the basic settings of the HTTP profile. This week, we’ll cover the enforcement parameters available in the profile, again focusing strictly on the reverse proxy mode profile... Read more
0 Reviews

Legacy Application SSO with BIG-IP and Okta

IT organizations have a simple goal: make it easy for workers to access all their work applications from any device. But that simple goal becomes complicated when new apps and old, legacy applications do not authenticate in the same way. Today... Read more
1 Review

What is HTTP Part V - HTTP Profile Basic Settings

In the first four parts of this series on HTTP, we laid the foundation for understanding what’s to come. In this article, we’ll focus on the basic settings in the BIG-IP HTTP profile. Before we dive into the HTTP-specific settings, however, let’s... Read more
Average Rating: 4.7
3 Reviews

Scenarios to automate BIG-IP with Puppet

DevOps is the best practice for businesses to pursue digital transformation strategies to venture into new revenue streams or simply remain competitive. It’s hard, though. One of the biggest challenges DevOps practitioners are facing is the... Read more
0 Reviews

Lightboard Lessons: Connecting Cars with BIG-IP

I light up how BIG-IP and Solace work together in a MQTT connected car infrastructure. ps Related: Using F5 BIG-IP and Solace Open Data Movement technology for MQTT message routing and delivery Lightboard Lessons: What is MQTT? Read more
0 Reviews

DevCentral’s Featured Member for October – Jad Tabbara

Jad Tabbara has been a Security Engineer with e-Xpert Solutions in Switzerland since 2014. He graduated from INSA de Lyon FRANCE with a master degree in telecommunications and nowadays, work takes the most part of my time, but happy to succeed in... Read more
Average Rating: 4.4
3 Reviews

Using F5 BIG-IP and Solace Open Data Movement technology for MQTT message routing and delivery

The "Internet of Things" (IoT) has the potential to not just impact the way we live and work, but to disrupt entire industries. Some of the major industries that are driving innovation in IoT include manufacturing, transportation, and... Read more
0 Reviews

Customizing OpenStack LBaaSv2 Using Enhanced Services Definitions

There are many load balancing configurations which have no direct implementation in the OpenStack LBaaSv2 specification. It is easy to directly customize BIG-IP traffic management using profiles, policies, and iRules, but LBaaSv2 has no way to... Read more
0 Reviews

What is HTTP Part IV - Clients, Servers, and Proxies. Oh My!

So far in this series, we have covered the basics of HTTP messaging, the underlying protocols, and last week, we focused on digging a little deeper into the terminology. This week we will focus on the HTTP speakers: clients, servers, and proxies.... Read more
0 Reviews

Add a Data Collection Device to your BIG-IQ Cluster

Gathering and analyzing data helps organizations make intelligent decisions about their IT infrastructure. You may need a data collection device (DCD) to collect BIG-IP data so you can manage that device with BIG-IQ. BIG-IQ is a platform that... Read more
1 Review

Post of the Week: BIG-IP Upgrades

Many of our DevCentral users have asked about BIG-IP upgrades.  In this "Post of the Week" video, we discuss some things to think about and some cool tips to consider as you upgrade from one version to another. Read more
1 Review

What is HTTP Part III - Terminology

Have you watched the construction of a big building over time? For the first few weeks, the footers and foundation are being prepared to support the building. it seems like not much is happening, but that ground work is vital to the overall success.. Read more
1 Review

Automate BIG-IP in customer environments using Ansible

There are a lot of technical resources on how Ansible can be used to automte the F5 BIG-IP. A consolidated list of links to help you brush up on Ansible as well as help you understand the Ansible BIG-IP solution > - github/devcentral etc I am... Read more
1 Review

Lightboard Lessons: What is HTTP?

In this Lightboard Lesson, I light up some #basics about HTTP. HTTP defines the structure of messages between web components such as browser or command line clients, servers like Apache or Nginx, and proxies like the BIG-IP. ps Related: What is... Read more
1 Review

What is HTTP Part II - Underlying Protocols

Last week in part one of this series, we took the 50,000 foot view of the HTTP protocol. HTTP defines the structure of message transfer for web resources, but doesn’t have anything to say about or do with the underlying infrastructure (through... Read more
Average Rating: 4.9
3 Reviews

Automatically Update your BIG-IP Pool Using the Service Discovery iApp

Let’s look at how to automatically add members to your BIG-IP pool by using the Service Discovery iApp. Whenever you deploy a BIG-IP Virtual Edition by using one of the templates on the F5 Github site, this iApp is installed on the BIG-IP. The... Read more
0 Reviews

Nessus 6 XSLT Conversion for ASM Generic Scanner Import

Nessus 6 XSLT Conversion for ASM Generic Scanner Schema Import Read more
Average Rating: 4.9
6 Reviews

What is HTTP?

tl;dr - The Hypertext Transfer Protocol, or HTTP, is the predominant tool in the transferring of resources on the web, and a "must-know" for many application delivery concepts utilized on BIG-IP HTTP defines the structure of message... Read more
Average Rating: 4.8
8 Reviews

Apache Struts 2 REST plugin Remote Code Execution (CVE-2017-9805)

In the recent days, a new critical Apache Struts 2 vulnerability was announced which allows remote attackers to execute arbitrary commands on the server. The original post (S2-052) has not published exploit details yet, most probably to allow... Read more
Average Rating: 4.7
4 Reviews

DevCentral’s Featured Member for September – Rob Carr

Rob Carr is a Senior Trainer/Professional Services Consultant with Red Education Pty in Australia, covering the Oceania and Asia markets. He has done training and engagements from New Zealand to Taiwan and points in between. About 60% of his time... Read more
1 Review

Tightening the Security of HTTP Traffic Part 3

Part 3:   Headers to remove   Server and X-Powered-by headers The Server and X-Powered-By headers:  Should be removed or changed These are added by default by some web servers such as apache, nginx, Express,…   Example:... Read more
0 Reviews

Translating Cipher Suites from Wireshark to BIG-IP

Many of us use Wireshark to capture and analyze network traffic.  When it comes to SSL/TLS traffic, Wireshark does a great job of showing the cipher suites presented by the client and then the cipher suite chosen by the server in a given... Read more
Average Rating: 4.9
4 Reviews

PHP Serialized Object Vulnerabilities

Object serialization has always been a tricky subject. Using serialization as a design pattern can always lead to catastrophic consequences such as remote code execution when user input isn't properly validated. Read more
0 Reviews