Learn F5 Technologies, Get Answers & Share Community Solutions Join DevCentral

Filter by:
  • Solution
  • Technology
Clear all filters

Articles

Sort results

How to Set up F5 Application Connector

Last week we covered the basic overview of Application Connector and this week we’ll look at how to set it up. [The link to the setup guide] Settle in, this is detailed. F5 Application Connector is made up of two components: The Proxy and the... Read more
1 Review

Oracle Tuxedo "JOLTandBLEED" vulnerability (CVE-2017-10269)

In November 2017 Oracle published a vulnerability in the Jolt Server which is a component of Oracle Tuxedo. Just recently, a PoC exploit for this vulnerability has been published. Using the JOLT protocol, attackers could send specially crafted... Read more
0 Reviews

DevCentral's Featured Member for February - Lee Sutcliffe

After a brief hiatus for the New Year, we're kicking off the 2018 Featured Member series with a new DevCentral MVP: MrPlastic, Lee Sutcliffe. Like Kevin this past December, Lee does a great job with the opening question, so we'll let him... Read more
Average Rating: 4.9
3 Reviews

F5 Editor Eclipse Plugin v2

We are pleased to announce availability of our updated F5 Programmability Editor for Eclipse IDE v2. The F5 Programmability Development Environment for Eclipse allows you to use the Eclipse IDE to manage iRules, iRules LX, iControl LX, and iApps... Read more
2 Reviews

What is HTTP Part IX - Policies and iRules

In this article we pivot slightly from describing the protocol itself to showing ways to interact with the HTTP protocol via iRules and local traffic policies... Read more
0 Reviews

iRule Execution Tracing and Performance Profiling, Part 3

This article answers some frequently asked questions about the iRules tracing feature and offers some suggestions on best practices. Read more
1 Review

iRule Execution Tracing and Performance Profiling, Part 2

This article continues the introduction of iRules tracing and profiling feature. It uses examples to describe how to configure and run the feature. Read more
2 Reviews

DevCentral's Featured Member for December - Kevin Davies

When we prepare for our Featured Member series, I typically send out a questionnaire and the DevCentral member writes out their answers. With the opening question I'll do a bit of editing and use that for the intro. This month however,... Read more
2 Reviews

Mitigate L7 DDoS with BIG-IP ASM

Today, let’s look at a couple ways to mitigate a DDoS attack with BIG-IP ASM. We’ve logged into a BIG-IP ASM and navigated to Security>DDoS Protection>DDoS Profiles. In the General Settings of Application Security, we’ll activate an... Read more
1 Review

iRule Execution Tracing and Performance Profiling, Part 1

This article is the first of a series to introduce a new iRule feature in BIP-IP v13.1 release, iRule execution tracing and performance profiling. Read more
Average Rating: 4.9
3 Reviews

Post of the Week: Replacing a String in the Request URI

In this week’s Post of Week, I address community member Shann_P’s question on how to make an iRule update a string at a specific location within the path of the URI: The iRule needs to be able to locate the 7th "chunk" of the URI, add a... Read more
0 Reviews

Post of the Week: Blocking a Specific URI

In this "Post of the Week" video, we show how to block a specific URI using a custom ASM signature and an iRule. Read more
0 Reviews

NetOps is on the Move and You Can Help Give it Directions

For three years now, my cohort Cindy Borovick and I have been tracking the app services, trends, and technology that ultimately shape the lives of folks in the trenches. It sometimes takes a while (almost ten years for cloud) before the winds of... Read more
1 Review

Post of the Week: HTTP Redirect using Datagroups

John discusses HTTP redirects using datagroups and iRules. Read more
Average Rating: 4.9
4 Reviews

DevCentral’s Featured Member for September – Rob Carr

Rob Carr is a Senior Trainer/Professional Services Consultant with Red Education Pty in Australia, covering the Oceania and Asia markets. He has done training and engagements from New Zealand to Taiwan and points in between. About 60% of his time... Read more
1 Review

Tightening the Security of HTTP Traffic Part 2

This is the second part of this article which provides guidelines for tightening the security of http traffic by leveraging the power of F5 Big-IP and  iRules to include the latest HTTP security headers to all HTTP responses. Read more
2 Reviews

Tightening the Security of HTTP Traffic part 1

In this article, I will give an overview of some important headers that can be added to HTTP responses in order to improve the security web applications. Read more
Average Rating: 4.9
6 Reviews

Office 365 Logon Enhancement – Username Capture

With the new Office 365 sign-in experience you can capture the username entered at the O365 login page so users don't need to enter it twice! Read more
2 Reviews

DevCentral’s Featured Member for August – Piotr Lewandowski

Piotr Lewandowski has been working in IT for well over 20 years – and not really conscious decision to go this way – just blind luck. He started in the era without Internet…yes, not so long ago it was possible to live without Internet J…and IBM... Read more
Average Rating: 4.9
3 Reviews

DevCentral’s Featured Member for July – Vosko Networking’s Niels van Sluis

For almost two years Niels van Sluis has worked as a Security Engineer for Vosko Networking. Vosko's security team focuses on supporting security solutions from various vendors like F5, Check Point, Cisco and RSA. Niels focuses is on F5 BIG-IP... Read more
1 Review

‘Fast’ API and Application Routing

Proxy API and Application traffic at high speeds with F5 BIG-IP. Lori MacVittie explains how. Read more
1 Review

Deploy an App into Kubernetes Using Advanced Application Services

Introduction Welcome to week three of the Kubernetes and BIG-IP series. In the previous article we learned how easy it is to deploy complex applications into Kubernetes running on Google Container Engine (GKE). As you might imagine, that... Read more
0 Reviews

Persisting SNAT Addresses in Link Controller Deployments

My friend Bruce Hampton recently reached out with a problem he was facing with a BIG-IP Link Controller (LC) deployment. The problem? How do you persist the client address AND the snat address? Read more
0 Reviews

WannaCry Ransomware and MS17-010 Vulnerability

On Friday 12 May 2017 a large ransomware attack dubbed “WannaCry” was launched targeting more than 200,000 computers worldwide, including industries such as banks, hospitals and large telecom companies. Figure 1: “WannaCry” ransom... Read more
2 Reviews

F5 BIG-IP MQTT protocol support and use cases in an IoT environment

F5 BIG-IP iRules allow deep understanding and decision making within the MQTT protocol. Check out some use cases and more. Read more
Average Rating: 4.9
5 Reviews