Learn F5 Technologies, Get Answers & Share Community Solutions Join DevCentral

Filter by:
  • Solution
  • Technology

Articles

Sort results

Hulk Smash Puny SSH!

Sorry, I’ve been monkeying around on the twitter birds, following one of my favorites, SecurityHulk. https://twitter.com/securityhulk Follow, read, laugh, cry, and ponder the Green Wisdom.   Anywho, todays fun to be had is SSH.&#16... Read more
0 Reviews

v11.2 Features: tclsh

One of the many things that I talk about quite often when presenting about or discussing iRules is troubleshooting and testing. Mind you these are two different, yet similar things. The difference is basically whether things are pre or post... Read more
0 Reviews

iRules Concepts: Logging, a Deeper Understanding

Multiple times in recent iRules presentations, whether on the road or here within F5, there have been questions raised when the topic of logging within iRules gets brought up. Specifically people are curious about logging best practices,... Read more
0 Reviews

8.3 Alternate Names With ARX

Summary 8.3 names are a relic of the 1980’s, when the FAT12 and FAT16 file systems used in MS-DOS did not have a provision for arbitrarily-long filenames. In those days, names could have at most eight characters, followed by a single period, and... Read more
0 Reviews

DNS Resolution via iRules: NAME::lookup vs RESOLV::lookup

There are so many things that you can do with iRules that it can be pretty staggering to narrow down what the "most useful" commands are, but if I were given that task and absolutely had to, I would say that DNS resolution ranks up there... Read more
Average Rating: 4.9
3 Reviews

ARX Tiered Storage: Best Practices

Introduction The ARX has many features for controlling file placement between the servers behind the ARX. ARX File Placement Policy (policy) has many configuration options that allow for fine tuning the behavior of rules. Under most circumstances... Read more
0 Reviews

iRules IP Comparison Considerations with IP::addr Command

Anyone utilizing IP network comparisons in iRules is probably familiar with this syntax: 1: if { [IP::addr [IP::client_addr]/24 equals 10.10.20.0] } { 2: ##Do this 3: } In fact, there are several methods for doing a... Read more
Average Rating: 4.9
3 Reviews

iRules Data Group Formatting Rules

BIG-IP LTM supports internal and external classes (called Data Groups in the GUI) of address, string, and integer types.  An internal class is stored in the bigip.conf file, whereas external classes are split between the bigip.conf and the... Read more
Average Rating: 4.5
6 Reviews

Comparing iRule Control Statements

A ways back, we put up an article titled “Ten Steps to iRules Optimization” in which we illustrated a few simple steps to making your iRules faster.  Item #3 in that article was “Understanding Control Statements”.  I decided to put the... Read more
0 Reviews

A Brief Introduction To External Application Verification Monitors

Background EAVs (External Application Verification) monitors are one of most useful and extensible features of the BIG-IP product line. They give the end user the ability to utilize the underlying Linux operating system to perform complex and... Read more
2 Reviews

Writing to and rotating custom log files

Sometimes I need to log information from iRules to debug something. So I add a simple log statement, like this: when HTTP_REQUEST {   if { [HTTP::uri] equals "/secure" } {     log local0. "[IP::remote_addr]... Read more
Average Rating: 4.5
6 Reviews

Problems Overcome During a Major LTM Software/Hardware Upgrade

I recently completed a successful major LTM hardware and software migration which accomplished two high-level goals: ·         Software upgrade from v9.3.1HF8 to v10.1.0HF1... Read more
0 Reviews

Authoring an F5 Management Pack PowerShell Agent Task in SCOM 2007 R2

1. Overview This article describes a step-by-step procedure on authoring a custom PowerShell agent task targeting the F5 Management Pack in System Center Operations Manager (SCOM) 2007 R2. I will use the Authoring Console shipped with the System... Read more
0 Reviews

v.10 Introduction to the tmsh Command Shell

Normal 0 false false false MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-style-parent:""; font-size:10.0pt;"Times New R... Read more
2 Reviews

Quick iRule Redirection

The F5 BIG-IP iRules redirection Generator. New iRules users are often floored by the sheer volume of possibilities they are confronted with. iRules offers you amazing flexibility in solving your networking problems with ingenious solutions, but... Read more
0 Reviews

iC2I: Automation - Creating Virtuals Simplified.

There are several instances where you need server or workstation command line access to your BIG-IP, automation being the primary instance. For a long time we have wanted to start providing you with automation tools that will help you do your... Read more
0 Reviews

Rewriting Redirects

While best practices for virtualized web applications may indicate that relative self-referencing links and redirects (those which don't include the protocol or the hostname) are preferable to absolute ones (those which do), many applications... Read more
Average Rating: 4.9
3 Reviews

iRule Interference: Custom Closes and Responses

iRules provide a number of customizations to the already full feature set offered by LTM’s highly configurable protocol profiles.  In this article I’ll give an overview of several useful commands which allow LTM to “interfere” with normal... Read more
2 Reviews

Deploying F5 Networks BIG-IP Local Traffic Manager with WebAccelerator for Microsoft Office SharePoint Server 2007

This white paper describes the deployment of F5 BIG-IP Local Traffic Manager (LTM) with F5 BIG-IP WebAccelerator in both symmetric and asymmetric deployments supporting Office SharePoint Server 2007 solutions accessed over a Wide Area Network... Read more
0 Reviews

iRules: Clone Pool Persistence

In LTM, persistence is configured at the virtual server level, rather than at the pool level as was the case in BIG-IP 4.x.  The current set of LTM persistence profiles and iRules commands operate by default only on the load balancing pool,... Read more
0 Reviews

Composites and Mashups and Processes, Oh My!

By Lori  MacVittie In the increasingly buzzword compliant world of SOA and Web 2.0 it is inevitable that you have, or will, come across three of the industries’ favorite terms: composites, mashups, and processes. These terms represent... Read more
0 Reviews

Tweaking FirePass – Integrating RSA SecurID via WebDAV Customization

Note: Special thanks to the Firepass development team for providing this tip. As IT departments deploy an ever-growing list of mobile devices, secure authentication becomes an even bigger nightmare to keep IT management awake at night. One option... Read more
0 Reviews