Learn F5 Technologies, Get Answers & Share Community Solutions Join DevCentral

Filter by:
  • Solution
  • Technology


Sort results

HTTP/2 Protocol in Plain English using Wireshark

A quick HTTP/2 lab test using BIG-IP VE, one client and Wireshark Read more
Average Rating: 5.0
18 Reviews

What is HTTP Part X - HTTP/2

In the penultimate article in this What is HTTP? series we covered iRules and local traffic policies and the power they can unleash on your HTTP traffic. To date in this series, the content primarily focuses on HTTP/1.1, as that is still the... Read more
Average Rating: 4.9
3 Reviews

The Three HTTP Routing Patterns You Should Know

HTTP is the de-facto application transport layer. The majority of applications and APIs today are delivered via HTTP, regardless of their content (HTML, JSON, XML).  That means most of the scaling going on is focused on scaling HTTP-based... Read more
1 Review

What is HTTP Part IX - Policies and iRules

In this article we pivot slightly from describing the protocol itself to showing ways to interact with the HTTP protocol via iRules and local traffic policies... Read more
0 Reviews

What is HTTP Part VIII - Compression and Caching

In the last article of this What is HTTP? series we covered the nuances of OneConnect on HTTP traffic through the BIG-IP. In this article, we’ll cover caching and compression. We’ll deal with compression first, and then move on to... Read more
1 Review

What is HTTP Part VII - OneConnect

In the last article in this What is HTTP? series we finished covering the settings in the HTTP profile itself. This week, we begin the transition to technologies that support, enhance, optimize, secure, and (insert your descriptive qualifier... Read more
Average Rating: 4.9
6 Reviews

Prevent a Spoof of an X-Forwarded-For Request with BIG-IP

Last week, we looked at how to do Selective Compression on BIG-IP with a local traffic policy so this week let’s try something security related using the same procedures. You can associate a BIG-IP local traffic policy to prevent a spoof of an... Read more
0 Reviews

What is HTTP Part VI - HTTP Profile Enforcement Settings

In last week’s article in the What is HTTP? series, we covered the basic settings of the HTTP profile. This week, we’ll cover the enforcement parameters available in the profile, again focusing strictly on the reverse proxy mode profile... Read more
2 Reviews

What is HTTP Part V - HTTP Profile Basic Settings

In the first four parts of this series on HTTP, we laid the foundation for understanding what’s to come. In this article, we’ll focus on the basic settings in the BIG-IP HTTP profile. Before we dive into the HTTP-specific settings, however, let’s... Read more
Average Rating: 4.8
4 Reviews

What is HTTP Part IV - Clients, Servers, and Proxies. Oh My!

So far in this series, we have covered the basics of HTTP messaging, the underlying protocols, and last week, we focused on digging a little deeper into the terminology. This week we will focus on the HTTP speakers: clients, servers, and proxies.... Read more
1 Review

What is HTTP Part III - Terminology

Have you watched the construction of a big building over time? For the first few weeks, the footers and foundation are being prepared to support the building. it seems like not much is happening, but that ground work is vital to the overall success.. Read more
Average Rating: 4.9
4 Reviews

Lightboard Lessons: What is HTTP?

In this Lightboard Lesson, I light up some #basics about HTTP. HTTP defines the structure of messages between web components such as browser or command line clients, servers like Apache or Nginx, and proxies like the BIG-IP. ps Related: What is... Read more
1 Review

What is HTTP Part II - Underlying Protocols

Last week in part one of this series, we took the 50,000 foot view of the HTTP protocol. HTTP defines the structure of message transfer for web resources, but doesn’t have anything to say about or do with the underlying infrastructure (through... Read more
Average Rating: 4.8
4 Reviews

What is HTTP?

tl;dr - The Hypertext Transfer Protocol, or HTTP, is the predominant tool in the transferring of resources on the web, and a "must-know" for many application delivery concepts utilized on BIG-IP HTTP defines the structure of message... Read more
Average Rating: 4.8
8 Reviews

Tightening the Security of HTTP Traffic part 1

In this article, I will give an overview of some important headers that can be added to HTTP responses in order to improve the security web applications. Read more
Average Rating: 4.9
10 Reviews

20 Lines or Less #84: iRule Solutions for Basic Auth, Host Rewrites, and Conditional Redirects

What could you do with your code in 20 Lines or Less? That's the question we like to ask from, for, and of (feel free to insert your favorite preposition here) the DevCentralcommunity, and every time we do, we go looking to find cool new... Read more
0 Reviews

Ready or not, HTTP 2.0 is here

From HTTP to SPDY, to HTTP 2.0. The introduction of a new protocol optimized for today’s evolving web services opens the door to a world of possibilities. But are you ready to make this change?While the breakneck speed with which applications,... Read more
1 Review

新しいウェブプロトコルHTTP 2.0にいち早く対応するための「ゲートウェイ」という考え方

HTTPからSPDY、そしていよいよHTTP2.0へ ― 進化するウェブサービス最適な最新のウェブのプロトコル導入を見据え、様々な取り組みが始まっています アプリケーション、デバイス、サイバーセキュリティの進化は目まぐるしく進んでいますが、インターネットの大部分の通信を担う通信プロトコル「HTTP」は実は初代からあまり大きな進化を遂げていない ― これは意外と知られていない現実です。 インターネット標準化団体であるIETFの資料によると、初代のHTTP... Read more
0 Reviews

LineRate HTTP to HTTPS redirect

A quick LineRate proxy code snippet to convert an HTTP request to a HTTPS request using the embedded Node.js engine. Read more
Average Rating: 4.9
5 Reviews

HTTP 2.0 changes everything

#HTTP #ietf #webperf #infosec Despite the hype and drama surrounding the HTTP 2.0 effort, the latest version of the ubiquitous HTTP protocol is not just a marketing term. It's a real, live IETF standard that is scheduled to "go... Read more
Average Rating: 3.9
5 Reviews

What Does 'HTTP is the new TCP' Mean for You

#SDN #webperf  It means you can't use "network" protocols to make intelligent decisions about applications any more. Back in 2000 (or 2001, I forget exactly), I got to test a variety of bandwidth management appliances. Oh, they... Read more
0 Reviews

Verify, but Never Trust?

Much is being written lately about so-called "Zero Trust Model" security, which prompts me to ask, "Since when did we security folk trust anyone?"  On the NIST site, you'll find a thorough report NIST commissioned from... Read more
0 Reviews

HTTP Isn't Enough

#sdas #devops #webperf Speaking "HTTP" doesn't make you application fluent, it makes you protocol fluent. There are over a million apps in the Google Play Store. There are also about a million apps in the Apple App Store. That's... Read more
0 Reviews

Bandwidth, Bandwidth, Bandwidth!

#SDN To really provision bandwidth efficiently you have to get inside the application. One of the most commonly cited use cases for SDN (the classical, architectural definition) centers on ensuring quality of service for applications, usually by... Read more
0 Reviews

Application Security in the Cloud is still Cloudy

#infosec #cloud An interesting statistic raises an even more interesting question. IBM shared a security related infographic via Twitter recently and in looking through the statistics (most of which are attributed to 2011 research, by the way) I... Read more
0 Reviews