Learn F5 Technologies, Get Answers & Share Community Solutions Join DevCentral

Filter by:
  • Solution
  • Technology
Clear all filters

Articles

Sort results

Post of the Week: BIG-IP Policy Sync

In this Lightboard Post of the Week, I light up the answer to a question about BIG-IP APM Policy Sync. Posted Question on DevCentral: https://devcentral.f5.com/questions/apm-policy-sync-56330 Thanks to DevCentral user Murali (@MuraliGopalaRao) for... Read more
0 Reviews

Lightboard Lessons: SSL Visibility - The Ultimate Inline Inspection Architecture

Now that the majority of web traffic is encrypted with Forward Secret ciphers, how do you monitor your incoming web traffic for threats? Join guest host David Holmes again this week for another Lightboard Lesson on the ultimate SSL visibility... Read more
0 Reviews

VDI Gateway Federation with BIG-IP

Today let’s look at how F5 BIGIP APM can consolidate, secure and federate all the core VDI gateways technology. For instance, if an organization decides move from one VDI technology to another or if you’re consolidating VDI technologies, BIG-IP... Read more
2 Reviews

Lightboard Lessons: SSL Visibility - The Ultimate Passive Inspection Architecture

Join DevCentral guest host David Holmes as he details the ultimate passive inspection architecture in this latest episode of Lightboard Lessons! Read more
1 Review

Building an OpenSSL Certificate Authority - Creating ECC Certificates

Build an OpenSSL ECC-based certificate authority for your lab. Create and sign your own ECC Certificates for use in any DevOps infrastructure. Read more
0 Reviews

Building an OpenSSL Certificate Authority - Configuring CRL and OCSP

Build an OpenSSL ECC-based certificate authority for your lab. Build certificate revocation functionality within your developer or lab environment for true client testing. Read more
0 Reviews

Building and OpenSSL Certificate Authority - Creating Your Intermediary Certificate

Build an OpenSSL ECC-based certificate authority for your lab. Create your own ECC Intermediary CA for use in any DevOps infrastructure. Read more
0 Reviews

Building an OpenSSL Certificate Authority - Creating Your Root Certificate

Build an OpenSSL ECC-based certificate authority for your lab. Create your own ECC Root CA for use in any DevOps infrastructure. Read more
0 Reviews

Building an OpenSSL Certificate Authority - Introduction and Design Considerations for Elliptical Curves

Build an OpenSSL ECC-based certificate authority for your lab. Using Suite B PKI as our guidelines we'll create a two-tier PKI infrastructure perfect for any isolated environment. Read more
0 Reviews

Post of the Week: Blocking a Specific URI

In this "Post of the Week" video, we show how to block a specific URI using a custom ASM signature and an iRule. Read more
0 Reviews

Oracle Identity Manager Remote Hijack Vulnerability (CVE-2017-10151)

Last week, Oracle has released an out of cycle security advisory (CVE-2017-10151) for a vulnerability which affects Oracle identity manager. The vulnerability allows attackers to access Oracle Identity Manager using a built-in account... Read more
0 Reviews

Lightboard Lessons: What is DDoS?

Over the last quarter, there were approximately 500 DDoS attacks daily around the world with some lasting as long as 300 hours. In this Lightboard Lesson I light up some #basics about DoS and DDoS attacks.   ps Related: DDoS attacks in Q2... Read more
0 Reviews

DevCentral’s Featured Member for November – Nathan Britton

Nathan Britton works as a Principal Security Consultant in the UK for a security solutions provider called NTT Security, part of the NTT Group. They work with customers to design and implement security solutions and his team specializes in... Read more
0 Reviews

Prevent a Spoof of an X-Forwarded-For Request with BIG-IP

Last week, we looked at how to do Selective Compression on BIG-IP with a local traffic policy so this week let’s try something security related using the same procedures. You can associate a BIG-IP local traffic policy to prevent a spoof of an... Read more
0 Reviews

Post of the Week: Explaining the KRACK Vulnerability

The KRACK attack targets a vulnerability in the WPA2 security protocol that allows for encryption between a mobile device and a wireless router. Read more
Average Rating: 4.9
3 Reviews

Lightboard Lessons: What are Bots?

In this Lightboard Lesson, I light up some #basics about internet bots and botnets. Humans account for less than 50% of internet traffic and the rest is spread between the good bots and bad ones. ps Related: The Facts about Botnets The state of... Read more
2 Reviews

Lightboard Lessons: Credential Stuffing

The essence of the Credential Stuffing problem centers around the fact that lots and lots of user credentials have been stolen from many different places.  An attacker will take stolen credentials from one place and try to "stuff" them into another Read more
1 Review

Mazar Bot Overview

Mazar Bot targets multiple banks with malware that is spread through SMS text messages. Read more
0 Reviews

Legacy Application SSO with BIG-IP and Okta

IT organizations have a simple goal: make it easy for workers to access all their work applications from any device. But that simple goal becomes complicated when new apps and old, legacy applications do not authenticate in the same way. Today... Read more
1 Review

DevCentral’s Featured Member for October – Jad Tabbara

Jad Tabbara has been a Security Engineer with e-Xpert Solutions in Switzerland since 2014. He graduated from INSA de Lyon FRANCE with a master degree in telecommunications and nowadays, work takes the most part of my time, but happy to succeed in... Read more
Average Rating: 4.5
4 Reviews

Joomla LDAP Injection Vulnerability (CVE-2017-14596)

In the recent days, a new vulnerability in Joomla has been published (CVE-2017-14596). The vulnerability concerns Joomla installations which have Joomla’s LDAP plugin installed and are using it to authenticate the system’s users. The vulnerability... Read more
0 Reviews

Apache Tomcat Remote Code Execution via JSP upload (CVE-2017-12615 / CVE-2017-12617)

In the recent days, a new vulnerability in Apache Tomcat has been published (CVE-2017-12615). The vulnerability allows attackers to upload arbitrary files to the Tomcat application server by utilizing the HTTP PUT method. By uploading a .JSP file... Read more
1 Review

Lightboard Lessons: Dynamic AFM Policy Selection Based on Geolocation

For some web applications, you need a separate network firewall policy for users from different geographic locations.  Using the power of iRules and VIP-targeting-VIP solutions, you can dynamically select an AFM policy based on source IP geolocation. Read more
2 Reviews

Nessus 6 XSLT Conversion for ASM Generic Scanner Import

Nessus 6 XSLT Conversion for ASM Generic Scanner Schema Import Read more
Average Rating: 4.9
6 Reviews

Apache Struts 2 FreeMarker tag Remote Code Execution (CVE-2017-12611)

In the recent days, another 0-day remote code execution vulnerability in Apache Struts 2 has been published (CVE-2017-12611). This time the vulnerability’s root cause is not stemming from a bug in the Struts 2 framework, but a feature of the... Read more
2 Reviews