iRules is a highly customized, Tcl-based scripting language allowing you complete programmatic access to application traffic in real time. If you’re looking to inspect, analyze, modify, route, re-direct, discard, or manipulate traffic in any way, chances are you can do it with an iRule. They even give you the ability to write business logic into your network layer.
For almost two years Niels van Sluis has worked as a Security Engineer for Vosko Networking. Vosko's security team focuses on supporting security solutions from various vendors like F5, Check Point, Cisco and RSA. Niels focuses is on F5 BIG-IP...
Proxy API and Application traffic at high speeds with F5 BIG-IP. Lori MacVittie explains how.
Welcome to week three of the Kubernetes and BIG-IP series. In the previous article we learned how easy it is to deploy complex applications into Kubernetes running on Google Container Engine (GKE). As you might imagine, that...
My friend Bruce Hampton recently reached out with a problem he was facing with a BIG-IP Link Controller (LC) deployment. The problem? How do you persist the client address AND the snat address?
On Friday 12 May 2017 a large ransomware attack dubbed “WannaCry” was launched targeting more than 200,000 computers worldwide, including industries such as banks, hospitals and large telecom companies.
Figure 1: “WannaCry” ransom...
F5 BIG-IP iRules allow deep understanding and decision making within the MQTT protocol. Check out some use cases and more.
Leonardo is DevCentral’s Featured Member for May and we got a chance to talk with Leonardo about his life, work and scripting prowess.
Jinshu Peethambaran is a security architect currently working with Admiral Insurance. He started his career 9 years ago, managing network security operations and started working on F5 products about 5 years ago. He is also a 2017 DevCentral MVP...
Kai Wilke is a Principal Consultant for IT Security at itacs GmbH – a German consulting company located in Berlin City specializing in Microsoft security solutions, SharePoint deployments, and customizations as well as classical IT Consulting. He...
TLS fingerprinting is a methodology based on the attributes in an SSL/TLS handshake ClientHello message, attributes that are ever-so-slightly unique across different client user agents. This methodology, while not perfect, presents an interesting approach to identifying user agents without first decrypting the traffic and looking for an HTTP User-Agent header.
This iRule integrates a reCAPTCHA v2 with your virtual server.
This iRule is similar to the existing reCAPTCHA v1 on devcentral: https://devcentral.f5.com/codeshare/google-recaptcha-challenge-irule
You wish to provide a static maintenance splash page when all members of a pool serving a Virtual Server are currently down or disabled. This recipe provides a few approaches to accomplishing that.
An explanation of the mirai-strikeback iRule. The iRule sends an exploit back to Mirai bot processes and kills them. Use at your discretion.
Stanislas Piron is a Security Engineer for ExITeam. 16 years ago, Stanislas started out with Firewalls, email and Web content security. His first F5 deployment was with LTM and Link Controller 10 years ago and he is DevCentral’s Featured Member...
An iRule recipe for rewriting the Request Target (aka, Request-URI) and request Host transparently between client and server.
View more iRules Articles
Have a iRules Question or Discussion Topic?
View more iRules DownloadsView all Resources