Learn F5 Technologies, Get Answers & Share Community Solutions Join DevCentral

Filter by:
  • Solution
  • Technology

Articles

Sort results

Security Irules 101: You can’t always get what you want.. or can you?

Introduction iRules are a powerful tool in the F5 administrators arsenal. They allow administrators to adapt and customize the F5 to their needs.  They provide extensive power for security engineers as well. We’ve decided it’s tim... Read more
Average Rating: 4.9
3 Reviews

20 Lines or Less #75: URIs, URIs and more URIs

What could you do with your code in 20 Lines or Less? That's the question I like to ask for the DevCentral community, and every time I go looking to find cool new examples that show just how flexible and powerful iRules can be without getting... Read more
0 Reviews

iControl REST: Working with Pool Members

Since iControl REST is the new kid on the block, it's bound to start getting some of the same questions we've addressed with traditional iControl. One of these oft-asked and misunderstood questions is about enabling/disabling pool members.... Read more
Average Rating: 4.5
3 Reviews

20 Lines or Less #74: ASP Session Persistence, Radius Auth, and Fancy URIs

What could you do with your code in 20 Lines or Less? That's the question I like to ask for the DevCentral community, and every time I go looking to find cool new examples that show just how flexible and powerful iRules can be without getting... Read more
0 Reviews

20 Lines or Less #73: VIPs, SMTP Blocking and Responses

What could you do with your code in 20 Lines or Less? That's the question I like to ask for the DevCentral community, and every time I go looking to find cool new examples that show just how flexible and powerful iRules can be without getting... Read more
0 Reviews

High Performance Intrusion Prevention

Overview Utilizing the F5 BIG-IP ability to reliably load balance a high volume of concurrent connections to application services is further improved with integrations with IPS equipment providers. In this article I will articulate details... Read more
2 Reviews

NTLM Integrated SSO for SAML with the APM module and an External Logon Page

Leveraging the flexibility of the F5 APM module, this solution extends the ability to single sign on using integrated credentials. This is currently possible by installing the various browser based F5 APM plug-ins; this solution is back end based... Read more
0 Reviews

Pinhole/Pinpoint DNS

Resident superman and F5er Joel Moses dropped a solution in the wiki several weeks back utilizing an iRule to intercept dns requests and respond with different answers than the name servers would provide. As he states in the wiki entry, one of the... Read more
1 Review

Graphing Performance Data with bigsuds

I was asked internally about some performance graphs with python, and while I've done some work with python and iControl over the years, but I've yet to take on graphing. Most of the python scripts I've written output results to the... Read more
0 Reviews

20 Lines or Less #70

What could you do with your code in 20 Lines or Less? That's the question we like to ask from, for, and of (feel free to insert your favorite preposition here) the DevCentral community, and every time we do, we go looking to find cool new... Read more
0 Reviews

BIG-IP Interface Stats in Real Time with a TMSH Script

For the savants among us, calculating bits in and bits out over a delta from two snapshots of the interface counters is a walk in the park. For the rest of us, it's nice to have a tool to look at the current traffic load on an interface while... Read more
1 Review

Q&A Highlights - Phone Number Normalization

DevCentraler Mike posted a question today about the best way to approach normalizing phone numbers from Active Directory. Turns out not everyone is a an of normalizing them all in AD, so Mike reached out for suggestions. Regex is always a popular... Read more
0 Reviews

The TAO of Tables - Part Three

This is a series of articles to introduce you to the many uses of tables. The TAO of Tables - Part One The TAO of Tables - Part Two Last week we discussed ho... Read more
0 Reviews

The TAO of Tables - Part Two

This is a series of  articles to introduce you to the many uses of tables. The TAO of Tables - Part One Previously we talked about how tables can be used for counting. The... Read more
Average Rating: 4.9
3 Reviews

iCall Triggers - Invalidating Cache from iRules

iCall is BIG-IP's all new (as of BIG-IP version 11.4) event-based automation system for the control plane. Previously, I wrote up the iCall system overview, as well as an article on the use of a periodic handler for automating backups. This... Read more
0 Reviews

DNS Profile Benefits in iRules

SyntaxHighlighter.all(); I released an article a while back on the DNS services architecture now built in to BIG-IP, as well as a solution article that showed some fancy DNS tricks utilizing the architecture to black hole malicious... Read more
0 Reviews

BIG-IP LTM SYN Check

Denial of Service (DoS) attacks have been around for many years, but they are still frequently used today (ref: Iran's recent fascination with the US banking industry).  These attacks are used against servers to disrupt legitimate... Read more
1 Review

Getting Started with Bigsuds–a New Python Library for iControl

I imagine the progression for you, the reader, will be something like this in the first six- or seven-hundred milliseconds after reading the title: Oh cool! Wait, what? Don’t we already have like two libraries for python? Really, a third library... Read more
Average Rating: 4.6
10 Reviews

iRules logging to multiple locations with ease

Some months back I was at an account where we were developing some iRules to provide logging detail. One of the complications was that some of the infrastructure to support remote logging was in the process of being implemented and was not... Read more
1 Review

8.3 Alternate Names With ARX

Summary 8.3 names are a relic of the 1980’s, when the FAT12 and FAT16 file systems used in MS-DOS did not have a provision for arbitrarily-long filenames. In those days, names could have at most eight characters, followed by a single period, and... Read more
0 Reviews

Managing Ramcache Entries with Pycontrol

A DevCentral user posted a question in the forums asking for verification of an attribute on the RamCacheKey structure. The maximum_responses attribute should be a long integer. With his C# code, the maximum_responses returned from his iContro... Read more
0 Reviews

Base32 Encoding and Decoding With iRules

Introduction Anyone that's done any amount of programming has probably encountered Base64 encoded data. Data that is encoded with Base64 has the advantage of being composed of 64 ASCII characters, which makes it portable and readable with... Read more
0 Reviews

Implementing The Exponential Backoff Algorithm To Thwart Dictionary Attacks

Introduction Recently there was a forum post regarding using the exponential backoff algorithm to prevent or at the very least slow down dictionary attacks. A dictionary attack is when a perpetrator attacks a weak system or application by cyclin... Read more
0 Reviews

v11: DNS Express – Part 2

Introduction In our last Tech Tip, v11: DNS Express – Part 1, we discussed configuring DNS Express as an authoritative slave DNS server. We also discussed the advantages of using DNS Express in place of a pool of BIND servers. In this part of... Read more
0 Reviews

v11: DNS Express – Part 1

Introduction Among the many features released with GTM version 11, DNS Express has to be near the top of the list for many DNS administrators. DNS Express is a high performance in-memory authoritative DNS server. GTM has always been able to serve... Read more
0 Reviews