Learn F5 Technologies, Get Answers & Share Community Solutions Join DevCentral

Filter by:
  • Solution
  • Technology
Clear all filters


Sort results

Intelligent Proxy Steering - Office365

Introduction This solution started back in May 2015 when I was helping a customer bypass their forward proxy servers due to the significant increase in the number of client connections after moving to Office365. Luckily for them, they have a... Read more
Average Rating: 4.9
3 Reviews

Configuring the F5 BIG-IP as an Explicit Forward Web Proxy Using Secure Web Gateway (SWG)

In previous articles, we have discussed the use of F5 BIG-IP as a SSL VPN and other use cases for external or inbound access. I now wanted to take some time to discuss an outbound access use case using F5 BIG-IP as an explicit forward web proxy.... Read more
0 Reviews

Enabling Azure Active Directory Tenant Restrictions with F5

Microsoft’s Azure Active Directory(Azure AD) is the largest cloud-based enterprise directory in the world.  According to the data presented at the Microsoft Ignite conference, it has more than 750 million user accounts and handles more than... Read more
Average Rating: 4.9
5 Reviews

APM Cookbook: Dynamic APM Variables

In this article we’ll discuss how to set a variable dynamically. The most common use case is setting something like a role attribute to use in SAML... Read more
Average Rating: 4.9
3 Reviews

Security Sidebar: Your Device Just Attacked Someone…And You Didn’t Even Know It

Large scale Distributed Denial of Service (DDoS) attacks are no joke, and attackers can use them to inflict substantial damage to just about any target they want.  Depending on the target, the result of a DDoS attack could run the gamut of a... Read more
1 Review

New Elliptic Curve X25519 Trips Up ProxySG

Google's introduction of the X25519 threw some enterprise intercept devices for a loop. Here's how full-proxy automatically solves this problem. Read more
0 Reviews

Lightboard Lessons: SSL Outbound Visibility

You’ve been having trouble sleeping because of the SSL visibility problem with all the fancy security tools that don’t do decryption. Put down that ambien, because this Lightboard Lesson solves it. In episode, David Holmes diagrams the Right Way... Read more
Average Rating: 4.9
5 Reviews

You Don’t Own Anything Anymore Including Your Privacy

You purchased a Tesla Model S and live the %1 eco-warrior dream.  Imagine if GM purchased Tesla and sent an over-the-air update to disable all Tesla cars because they’re working on their own electric substitute? Literally even if you were ... Read more
2 Reviews

Verhindert das Silo-Konstrukt in Unternehmen ein umfassendes Sicherheitskonzept?

Buchbinder-Wanninger – Sie kennen das sicherlich. Keiner fühlt sich verantwortlich und jeder reicht die Anfrage von Einem zum Anderen. In Unternehmen ist es ähnlich geartet, wenn es um das Thema Sicherheit geht. Ist hier die Abteilung... Read more
0 Reviews

Einladung zum Webinar am 01. April um 11.00 Uhr: Anmeldedaten vor Malware und Phishing schützen

Kein Aprilscherz sondern eine herzliche Einladung zu unserem monatlichen Webinar am 01. April! Wir benötigen Logindaten für den Zugriff auf viele Anwendungen, die wir beruflich und privat nutzen. Sie sind damit der Schlüssel, um an... Read more
0 Reviews

Comment se protéger des Ransomwares ?

Le problème des ransomwares se développe à grande vitesse. Ces derniers sont de plus en plus utilisés par les hackers car ceux-ci ont besoin de plus en plus d’argent et cela de plus en plus souvent. Si ceux-ci ne bloquent... Read more
Average Rating: 4.7
3 Reviews