Learn F5 Technologies, Get Answers & Share Community Solutions Join DevCentral

Filter by:
  • Solution
  • Technology
Clear all filters

Articles

Sort results

DevCentral Architecture

Everyone has surely (don’t call me Shirley!) at least been exposed to THE CLOUD by now.  Whether it’s the—I’ll go with interesting—“to the cloud!” commercials or down in the nuts and bolts of hypervisors and programmatic interfaces for... Read more
1 Review

Advanced Edge Client Installation for Windows–The Mysteries of Windows Installer Revealed

In many small to medium sized companies (and even some fairly large ones), when you need a new piece of software installed on your desktop, you call the IT guy, or put in a trouble ticket, and the IT guy shows up with a DVD or CD, and install... Read more
Average Rating: 4.3
4 Reviews

F5 Security on Owasp Top 10: Injections

->Part of the F5/Owasp Top Ten Series    At the top of the  Owasp list is Injections. Their definition is “Injection flaws, such as SQL, OS, and LDAP injection, occur when untrusted data is sent to an interpreter as part of ... Read more
1 Review

F5 Security on Owasp Top 10

Everyone is familiar with the Owasp Top 10. Below, you will find some notes on the Top 10, as well as ways to mitigate these potential threats to your environment.  You can... Read more
Average Rating: 5.0
14 Reviews

APM Session Invalidation Using ASM

Introduction: Whenever customers expose their internal resources on the Web using VPNs or SSL VPNS there is still some concern over what type of traffic comes through the connection. In order to assist with these concerns we can provide a combine... Read more
Average Rating: 4.9
3 Reviews

ARX: Troubleshooting "CIFS Access Is Denied” Messages

Introduction It is impossible to enumerate all the scenarios under which CIFS access via or by ARX may be denied. In many cases, denial of access may be the desired behavior and can sometimes be temporary. This article is intended to aid in... Read more
0 Reviews

Getting Started with Splunk for F5

Pete Silva & Lori MacVittie both had blog posts last week featuring the F5 Application for Splunk, so I thought I’d take the opportunity to get Splunk installed and check it out.  In this first part, I’ll cover the installation process... Read more
Average Rating: 4.9
5 Reviews

Web Application Login Integration with APM

As we hurtle forward through the information age we continue to find ourselves increasingly dependant on the applications upon which we rely. Whether it's your favorite iPhone app or the tools that allow you to do your job, the application... Read more
1 Review

One Time Passwords via an SMS Gateway with BIG-IP Access Policy Manager

One time passwords, or OTP, are used (as the name indicates) for a single session or transaction.  The plus side is a more secure deployment, the downside is two-fold—first, most solutions involve a token system, which is costly i... Read more
Average Rating: 4.9
7 Reviews

HTTP Basic Access Authentication iRule Style

I started working on an administrator control panel for my previous Small URL Generator Tech Tip (part 1 and part 2) and realized that we probably didn’t want to make our Small URL statistics and controls viewable by everyone. That led me to make... Read more
Average Rating: 4.9
9 Reviews

v10.1 - Configuring GTM's DNS Security Extensions

Security extensions were added to the DNS protocol as a means of countering malicious attacks such as cache poisoning, domain hijacking, and man-in-the-middle attacks.  The extensions are described in detail in RFC 4033 (Introduction an... Read more
0 Reviews

iControl Apps - #12 - Global SSL Statistics

Continuing on with my series of applications on system level statistics, this application will look into the insides of the SSL subsystem and dump out the available statistics for client and server based SSL processing. Usage The arguments for... Read more
0 Reviews

iControl Apps - #06 - Configuration Archiving

Let's face it, we like to believe that disaster will never happen, but how many times have you accidentally deleted a document you have been working on for a presentation without a working backup?  Odds are more than once.  If it can... Read more
0 Reviews

iControl 101 - #06 - File Transfer APIs

The main use we see for iControl applications is with the automation of control features such as adding, removing, enabling, and disabling objects.   Another key step in multi-device management is the automation of applying hotfixes and... Read more
Average Rating: 4.9
5 Reviews

Configuring Client Certificate Passwordless Authentication on FirePass

Client side certificate authentication systems continue to gain popularity in many business verticals.  The ease and reliability of a certificate based system have the potential to save companies time and money through lowered operational... Read more
Average Rating: 3.4
5 Reviews

iRule Security 101 - #05 - Avoiding Path Traversal

Path Traversal is an attempt to access files and/or directories stored outside web root folder. If successful this could allow malicious users to view content they were not intended to see, execute programs that have lax permissions and were... Read more
0 Reviews

Requiring an SSL Certificate for Parts of an Application

When building many enterprise web-based applications, security must be taken seriously. iRules provide powerful capabilities for influencing security decisions when processing for your web services and applications. This is a rule for requiring a... Read more
0 Reviews