Learn F5 Technologies, Get Answers & Share Community Solutions Join DevCentral

irules

iRules is a highly customized, Tcl-based scripting language allowing you complete programmatic access to application traffic in real time. If you’re looking to inspect, analyze, modify, route, re-direct, discard, or manipulate traffic in any way, chances are you can do it with an iRule. They even give you the ability to write business logic into your network layer.

Learn more

Articles

Peter Silva
Updated 3 weeks ago by Peter Silva

For almost two years Niels van Sluis has worked as a Security Engineer for Vosko Networking. Vosko's security team focuses on supporting security solutions from various vendors like F5, Check Point, Cisco and RSA. Niels focuses is on F5 BIG-IP...

Lori MacVittie
Updated 3 weeks ago by Lori MacVittie
5 out of 5 stars

Proxy API and Application traffic at high speeds with F5 BIG-IP. Lori MacVittie explains how.

martyscholes
Updated 1 month ago by martyscholes

Introduction Welcome to week three of the Kubernetes and BIG-IP series. In the previous article we learned how easy it is to deploy complex applications into Kubernetes running on Google Container Engine (GKE). As you might imagine, that...

Jason Rahm
Updated 2 months ago by Jason Rahm

My friend Bruce Hampton recently reached out with a problem he was facing with a BIG-IP Link Controller (LC) deployment. The problem? How do you persist the client address AND the snat address?

Gal Goldshtein
Updated 2 months ago by Gal Goldshtein
5 out of 5 stars

On Friday 12 May 2017 a large ransomware attack dubbed “WannaCry” was launched targeting more than 200,000 computers worldwide, including industries such as banks, hospitals and large telecom companies. Figure 1: “WannaCry” ransom...

Payal
Updated 2 months ago by Payal
5 out of 5 stars

F5 BIG-IP iRules allow deep understanding and decision making within the MQTT protocol. Check out some use cases and more.

Peter Silva
Updated 2 months ago by Peter Silva
5 out of 5 stars

Leonardo is DevCentral’s Featured Member for May and we got a chance to talk with Leonardo about his life, work and scripting prowess.

Peter Silva
Updated 4 months ago by Peter Silva

Jinshu Peethambaran is a security architect currently working with Admiral Insurance. He started his career 9 years ago, managing network security operations and started working on F5 products about 5 years ago. He is also a 2017 DevCentral MVP...

Peter Silva
Updated 5 months ago by Peter Silva
5 out of 5 stars

Kai Wilke is a Principal Consultant for IT Security at itacs GmbH – a German consulting company located in Berlin City specializing in Microsoft security solutions, SharePoint deployments, and customizations as well as classical IT Consulting. He...

Kevin Stewart
Updated 12/30/2016 by Kevin Stewart
5 out of 5 stars

TLS fingerprinting is a methodology based on the attributes in an SSL/TLS handshake ClientHello message, attributes that are ever-so-slightly unique across different client user agents. This methodology, while not perfect, presents an interesting approach to identifying user agents without first decrypting the traffic and looking for an HTTP User-Agent header.

Lori MacVittie
Updated 3 weeks ago by Lori MacVittie
5 out of 5 stars

Proxy API and Application traffic at high speeds with F5 BIG-IP. Lori MacVittie explains how.

Gal Goldshtein
Updated 2 months ago by Gal Goldshtein
5 out of 5 stars

On Friday 12 May 2017 a large ransomware attack dubbed “WannaCry” was launched targeting more than 200,000 computers worldwide, including industries such as banks, hospitals and large telecom companies. Figure 1: “WannaCry” ransom...

Payal
Updated 2 months ago by Payal
5 out of 5 stars

F5 BIG-IP iRules allow deep understanding and decision making within the MQTT protocol. Check out some use cases and more.

Peter Silva
Updated 2 months ago by Peter Silva
5 out of 5 stars

Leonardo is DevCentral’s Featured Member for May and we got a chance to talk with Leonardo about his life, work and scripting prowess.

Peter Silva
Updated 5 months ago by Peter Silva
5 out of 5 stars

Kai Wilke is a Principal Consultant for IT Security at itacs GmbH – a German consulting company located in Berlin City specializing in Microsoft security solutions, SharePoint deployments, and customizations as well as classical IT Consulting. He...

John Alam
Updated 12/12/2016 by John Alam
5 out of 5 stars

This iRule integrates a reCAPTCHA v2 with your virtual server.     This iRule is similar to the existing reCAPTCHA v1 on devcentral:  https://devcentral.f5.com/codeshare/google-recaptcha-challenge-irule   Because...

Vernon
Updated 11/15/2016 by Vernon
5 out of 5 stars

You wish to provide a static maintenance splash page when all members of a pool serving a Virtual Server are currently down or disabled. This recipe provides a few approaches to accomplishing that.

David Holmes
Updated 10/31/2016 by David Holmes
5 out of 5 stars

An explanation of the mirai-strikeback iRule. The iRule sends an exploit back to Mirai bot processes and kills them. Use at your discretion.

Peter Silva
Updated 10/4/2016 by Peter Silva
5 out of 5 stars

Stanislas Piron is a Security Engineer for ExITeam. 16 years ago, Stanislas started out with Firewalls, email and Web content security. His first F5 deployment was with LTM and Link Controller 10 years ago and he is DevCentral’s Featured Member...

Vernon
Updated 10/3/2016 by Vernon
5 out of 5 stars

An iRule recipe for rewriting the Request Target (aka, Request-URI) and request Host transparently between client and server.

Have a iRules Question or Discussion Topic?

Answers

irule data group question
Updated 5 hours ago
0 votes
If not path1 or path2 irule issue
Updated 14 hours ago
0 votes
Geoblock exception based on user agent
Updated 14 hours ago
0 votes
Enforce TLS1.0 & TLS1.1 to TLS1.2
Updated 15 hours ago
By Jibinpv
0 votes