Learn F5 Technologies, Get Answers & Share Community Solutions Join DevCentral

Filter by:
  • Solution
  • Technology
Clear all filters

Articles

Sort results

Replacing a DNS Server with F5 BIG-IP DNS

First things first, you have decided to deploy F5 BIG-IP DNS to replace a BIND server after receiving notifications from your information assurance officer or your friendly LinkedIn community that additional CVE's have been identified for the... Read more
0 Reviews

Lightboard Lessons: OWASP Top 10 - Cross Site Scripting

The OWASP Top 10 is a list of the most common security risks on the Internet today.  Cross Site Scripting (XSS) comes in at the #7 spot in the latest edition of the OWASP Top 10... Read more
0 Reviews

Oracle Tuxedo "JOLTandBLEED" vulnerability (CVE-2017-10269)

In November 2017 Oracle published a vulnerability in the Jolt Server which is a component of Oracle Tuxedo. Just recently, a PoC exploit for this vulnerability has been published. Using the JOLT protocol, attackers could send specially crafted... Read more
0 Reviews

VE on VMware - Part 2 - Ansible Deployment

Continuing from part one of the series, this article shows a simple Ansible playbook for automating the deployment of VE on VMware. Read more
1 Review

Application Connector Overview

Application Connector connects public clouds to your application service infrastructure within cloud interconnects or data centers. Read more
0 Reviews

VE on VMware - Part 1 - Custom Properties

BIG-IP v13.1.0.2 introduced support for injecting configuration options into a BIG-IP Virtual Edition (VE) at deployment time. This article discusses how that functionality is used. Read more
2 Reviews

Lightboard Lessons: OWASP Top 10 - Security Misconfiguration

The OWASP Top 10 is a list of the most common security risks on the Internet today.  Security Misconfiguration comes in at the #6 spot in the latest edition of the OWASP Top 10... Read more
0 Reviews

The DevCentral Chronicles Volume 1, Issue 2

If you missed our initial issue of the DC Chronicles, check it out here. The Chronicles are intended to keep you updated on DevCentral happenings and highlight some of the cool articles you may have missed over the last month. Welcome. First up,... Read more
1 Review

DevCentral's Featured Member for February - Lee Sutcliffe

After a brief hiatus for the New Year, we're kicking off the 2018 Featured Member series with a new DevCentral MVP: MrPlastic, Lee Sutcliffe. Like Kevin this past December, Lee does a great job with the opening question, so we'll let him... Read more
Average Rating: 4.9
3 Reviews

Security Hardening F5's BIG-IP with SELinux

Updated for BIG-IP Version 13! When a major release hits the street, documentation and digital press tends to focus on new or improved user features, seldom do underlying platform changes make the spotlight. Each BIG-IP release have plenty new... Read more
Average Rating: 4.9
3 Reviews

Post of the Week: Two-Factor Auth and SSO with BIG-IP

In this Lightboard Post of the Week, I answer a question about 2FA and SSO with AD/RSA on BIG-IP by creating a SSO Credential Mapping policy agent in the Visual Policy Editor, that takes the username and password from the logon page, and maps them... Read more
2 Reviews

Load Balancing VMware Unified Access Gateway Integration Guide

Using our F5 Integration Guide to deploy BIG-IP LTM with VMware Unified Access Gateway. Read more
0 Reviews

Lightboard Lessons: OWASP Top 10 - Broken Access Control

The OWASP Top 10 is a list of the most common security risks on the Internet today. Broken Access Control comes in at the #5 spot in the latest edition of the OWASP Top 10. John discusses this security risk... Read more
0 Reviews

New BIG-IP ASM v13.1.0.1 Outlook Web Access (OWA) 2016 template

Updated ASM Outlook Web Access (OWA) 2016 template for BIG-IP version 13.x Read more
0 Reviews

Agility 2018 Open Call For Proposals Is Now Online

Be a part of Agility 2018 and present to your peers! The Agility 2018 call for proposals is now online! Read more
0 Reviews

Lightboard Lessons: OWASP Top 10 - XML External Entities

The OWASP Top 10 is a list of the most common security risks on the Internet today.  XML External Entities comes in at the #4 spot in the latest edition of the OWASP Top 10... Read more
2 Reviews

Get Social with DevCentral

That title sounds so 2009 but let’s go with it anyway. #Flashback…no, #Throwback…no, how about #TinkerTuesday? Is there such a thing? (There is.) #DevCentral will be ramping up our social activities in 2018 and we wanted to share some of the media... Read more
1 Review

The State of Application Delivery 2018: Automation is Everywhere

The Good Book tells us to “ask and ye shall receive.” That was certainly true when I asked for your input for the State of Application Delivery 2018. You responded with alacrity and honesty, and I cannot thank you enough for that. Truly, F5 is... Read more
0 Reviews

Lightboard Lessons: BGP Overview

In this episode of Lightboard Lessons, I break out my “router guy” hat from days gone by to deliver an overview of BGP, the border gateway protocol. This exterior gateway routing protocol is “THE” standard for exchanging routing information... Read more
0 Reviews

Meltdown and Spectre Web Application Risk Management

The recently disclosed groundbreaking vulnerabilities have set a precedent for how massive a security vulnerability can be. In the recent years, we have witnessed vulnerabilities that affect major frameworks like Java, PHP, OpenSSL and CGI... Read more
2 Reviews

Congratulations to the 2018 DevCentral MVPs!

We’re excited to announce 2018 DevCentral MVPs - our largest group of MVPs to date! The DevCentral MVP Award is given to a select group of exemplary people in the technical community who actively engage and share their experience and knowledge... Read more
Average Rating: 4.6
8 Reviews

The DevCentral Chronicles Volume 1, Issue 1

Welcome to 2018! If the kids in the back seat have been chanting, ‘Are we there yet?, Are we there yet?’ you can tell them, ‘Yes! Now, Get out the car!’ If, like me, you’ve taken a couple weeks off to enjoy the holidays and New Year, you might be... Read more
2 Reviews

BIG-IP Puppet Types and Providers

Operations teams are expected to manage increasingly complex, heterogeneous environments while meeting enterprise-class service levels for application delivery.  DevOps is the best practice for businesses to pursue digital transformation... Read more
0 Reviews

Lightboard Lessons: Explaining the Spectre and Meltdown Vulnerabilities

The "Spectre" and "Meltdown" vulnerabilities affect almost every computer in the world.  One of the very interesting things about each of these vulnerabilities is that they target the hardware (processor) of the computer rather than the software. Read more
2 Reviews

Lightboard Lessons: OWASP Top 10 - Sensitive Data Exposure

The OWASP Top 10 is a list of the most common security risks on the Internet today.  Sensitive Data Exposure comes in at the #3 spot in the latest edition of the OWASP Top 10. Read more
1 Review