Learn F5 Technologies, Get Answers & Share Community Solutions Join DevCentral

Filter by:
  • Solution
  • Technology

Articles

Sort results

These Are Not The Scrapes You're Looking For - Session Anomalies

In my first article in this series, I discussed web scraping -- what it is, why people do it, and why it could be harmful.  My second article outlined the details of bot detection and how the ASM blocks against these pesky littl... Read more
1 Review

More Web Scraping - Bot Detection

In my last article, I discussed the issue of web scraping and why it could be a problem for many individuals and/or companies.  In this article, we will dive into some of the technical details regarding bots and how the BIG-IP Application... Read more
2 Reviews

Web Scraping - Data Collection or Illegal Activity?

Web Scraping Defined   We've all heard the term "web scraping" but what is this thing and why should we really care about it?  Web scraping refers to an application that is programmed to simulate human web surfing b... Read more
0 Reviews

Interactive iControl with bigsuds

A couple months back we released a new iControl library for python called bigsuds. The introductory article for bigsuds covered some differences/enhancements in syntax between it and pycontrol versions one and two. Last week, I received an updat... Read more
1 Review

Getting Started with Bigsuds–a New Python Library for iControl

I imagine the progression for you, the reader, will be something like this in the first six- or seven-hundred milliseconds after reading the title: Oh cool! Wait, what? Don’t we already have like two libraries for python? Really, a third library... Read more
Average Rating: 4.6
10 Reviews

DevCentral Architecture

Everyone has surely (don’t call me Shirley!) at least been exposed to THE CLOUD by now.  Whether it’s the—I’ll go with interesting—“to the cloud!” commercials or down in the nuts and bolts of hypervisors and programmatic interfaces for... Read more
1 Review

Archiving BIG-IP Configurations with an iApp in v11.2

I wrote an article last year on utilizing iApps to put a front-end on a common system task, BIG-IP configuration archiving. This worked well for that initial v11 release, but something changed along the way that prevented some of the magic fro... Read more
0 Reviews

APM: Break it down Yo!

Access systems are messy. Wait, let me rephrase that, Poorly planned access systems are messy.  We’ve all seen it happen a thousand times. Someone comes r... Read more
2 Reviews

Advanced Edge Client Installation for Windows–The Mysteries of Windows Installer Revealed

In many small to medium sized companies (and even some fairly large ones), when you need a new piece of software installed on your desktop, you call the IT guy, or put in a trouble ticket, and the IT guy shows up with a DVD or CD, and install... Read more
Average Rating: 4.3
4 Reviews

Automagic Vulnerability Scanner Integration: Cenzic Style!

Welcome to the future!  Hoverboards for all,  new clear cola, skateboarding monkeys, and integrat... Read more
0 Reviews

F5 Security on Owasp Top 10: Injections

->Part of the F5/Owasp Top Ten Series    At the top of the  Owasp list is Injections. Their definition is “Injection flaws, such as SQL, OS, and LDAP injection, occur when untrusted data is sent to an interpreter as part of ... Read more
1 Review

F5 Security on Owasp Top 10

Everyone is familiar with the Owasp Top 10. Below, you will find some notes on the Top 10, as well as ways to mitigate these potential threats to your environment.  You can... Read more
Average Rating: 5.0
12 Reviews

Managing iApp template files with iControl

Templates An iApp is a user-customizable framework for deploying applications. It consists of three components: Templates, Application Services, and Analytics. An iApp Template is where the application is described and the objects (required... Read more
0 Reviews

Controlling a Pool Members Ratio and Priority Group with iControl

A Little Background A question came in through the iControl forums about controlling a pool members ratio and priority programmatically.   The issue really involves how the API’s use multi-dimensional arrays but I thought it would be a... Read more
2 Reviews

Google reCAPTCHA Verification With Sideband Connections

Introduction Virtually every dynamic site on the Internet these days makes use of a CAPTCHA in some fashion. A CAPTCHA is used to verify that a human is driving the interaction with a particular  function on a site. A CAPTCHA in its simples... Read more
0 Reviews

Two-Factor Authentication With Google Authenticator And LDAP

Introduction Earlier this year Google released their time-based one-time password (TOTP) solution named Google Authenticator. A TOTP is a single-use code with a finite lifetime that can be calculated by two parties (client and server) using ... Read more
Average Rating: 4.4
5 Reviews

v11.1–Add Signatures or Checksums to iRules via an iApp

iApps, introduced in v11, have a primary function in controlling the object creation and management for an application delivered by BIG-IP. As discussed previously, however, anything that can be accomplished in TMSH can be done in an iApp, so wha... Read more
1 Review

APM Session Invalidation Using ASM

Introduction: Whenever customers expose their internal resources on the Web using VPNs or SSL VPNS there is still some concern over what type of traffic comes through the connection. In order to assist with these concerns we can provide a combine... Read more
Average Rating: 4.9
3 Reviews

ARX: Troubleshooting "CIFS Access Is Denied” Messages

Introduction It is impossible to enumerate all the scenarios under which CIFS access via or by ARX may be denied. In many cases, denial of access may be the desired behavior and can sometimes be temporary. This article is intended to aid in... Read more
0 Reviews

iControl 101 - #24 - Folders

SyntaxHighlighter.all();Bucket Way back in time (well, not so way back), configuration objects were stored in one location in the configuration.  For the sake of this article, we’ll call this the root “bucket”.  This worked fine for... Read more
0 Reviews

Scheduling BIG-IP Configuration Backups via the GUI with an iApp

Beginning with BIG-IP version 11, the idea of templates has not only changed in amazing and powerful ways, it has been extended to be far more than just templates.  The replacement for templates is called iAppTM.  But to call the iAppT... Read more
0 Reviews

Automating Web App Deployments with Opscode Chef and iControl

Chef is a systems integration framework developed here in Seattle by Opscode. It provides a number of configuration management facilities for deploying systems rapidly and consistently. For instance, if you want 150 web servers configur... Read more
2 Reviews

Getting Started with Splunk for F5

Pete Silva & Lori MacVittie both had blog posts last week featuring the F5 Application for Splunk, so I thought I’d take the opportunity to get Splunk installed and check it out.  In this first part, I’ll cover the installation process... Read more
Average Rating: 4.9
5 Reviews

Web Application Login Integration with APM

As we hurtle forward through the information age we continue to find ourselves increasingly dependant on the applications upon which we rely. Whether it's your favorite iPhone app or the tools that allow you to do your job, the application... Read more
1 Review

One Time Passwords via an SMS Gateway with BIG-IP Access Policy Manager

One time passwords, or OTP, are used (as the name indicates) for a single session or transaction.  The plus side is a more secure deployment, the downside is two-fold—first, most solutions involve a token system, which is costly i... Read more
Average Rating: 4.9
7 Reviews