Learn F5 Technologies, Get Answers & Share Community Solutions Join DevCentral

Filter by:
  • Solution
  • Technology

Articles

Sort results

Managing Horizon Traffic across Multiple Data Centers with BIG-IP DNS

VMware Horizon virtual desktop clients typically use a fully qualified domain name (FQDN) when accessing desktop and application resources. More and more customers are distributing their Horizon application and desktop infrastucture to distribute... Read more
Average Rating: 4.9
4 Reviews

Implementing PCoIP Proxy as a Security Server or Access Point Alternative

VMware’s Horizon Security Server and Access Point provides secure access to sessions over an unsecured WAN and/or Internet connection. Typically, the Security Server/Access Point is placed within an organization’s DMZ. F5 BIG-IP Access Policy... Read more
Average Rating: 4.9
5 Reviews

Load Balancing VMware's Workspace Portal/Identity Manager with F5 BIG-IP Local Traffic Manager (LTM)

You can find the updated load balancing guide for VMware Workspace Portal/Identity Manager here. Stay tuned for a future post on how to securely access Workspace Portal/Identity Manager using BIG-IP, which will include secure proxy access... Read more
Average Rating: 4.9
5 Reviews

Getting Around the Logon/Legal Banner Issues when using APM PCoIP Proxy and Horizon

If you're using APM's PCoIP Proxy and require a logon banner, you've probably figured out that the PCoIP Proxy integration stops working when you turn on the integrated logon banner from within the Horizon Administrator. Adding to the... Read more
Average Rating: 4.9
3 Reviews

Deliver Resiliency and Scalability with Dell vWorkspace and F5's Local Traffic Manager

Recently, there's been some "buzz" around how to configure Dell vWorkspace components behind BIG-IP's Local Traffic Manager. A few months back, I had the opportunity to work with Stephen Yorke from the Dell vWorkspace team to put... Read more
0 Reviews

HOT OFF THE PRESSES – VMware and F5 Hands-On-Lab Now Available!

VMware and F5 are proud to announce the availability of one of the first partner-centric labs utilizing VMware’s global Hands-On-Lab infrastructure. In close collaboration with the VMware End User Computing Technical Enablement team, the VMware... Read more
2 Reviews

So, you want to use RSA SecurID with APM’s PCoIP Proxy Module…

Customers who leverage Access Policy Manager (APM) for remote access to VMware Horizon 6 (formerly known as VMware View) typically have some level of two-factor authentication (2FA) as an added layer of authentication. It’s especially important... Read more
1 Review

Blog Roll 2014

It’s that time of year when we gift and re-gift, just like this text from last year. And the perfect opportunity to re-post, re-purpose and re-use all my 2014 blog entries. If you missed any of the 96 attempts including 57 videos, here they are... Read more
1 Review

SDN: An architecture for operationalizing networks

As we heard at last week’s Open Networking Summit 2014, managing change and complexity in data centers is becoming increasingly difficult as IT and operations are constantly being pressured to deliver more features, more services, and more... Read more
1 Review

GartnerDC 2013: DDoS Reference Architecture

I meet with Sr. TMM David Holmes to get the scoop on F5’s DDoS Reference Architecture. David has circled the globe talking to customers about their security concerns and shares some of that insight along with explaining how F5 can mitigate those... Read more
0 Reviews

The Malware Mess

A couple weeks ago McAfee Labs released the McAfee Threats Report: Second Quarter 2013, which found that Android-based malware marked a 35% growth rate not seen since early 2012.  They also found twice as many new ransomware offerings in Q2... Read more
1 Review