Learn F5 Technologies, Get Answers & Share Community Solutions Join DevCentral

irules

iRules is a highly customized, Tcl-based scripting language allowing you complete programmatic access to application traffic in real time. If you’re looking to inspect, analyze, modify, route, re-direct, discard, or manipulate traffic in any way, chances are you can do it with an iRule. They even give you the ability to write business logic into your network layer.

Learn more

Articles

Peter Silva
Updated 1 week ago by Peter Silva
5 out of 5 stars

Rob Carr is a Senior Trainer/Professional Services Consultant with Red Education Pty in Australia, covering the Oceania and Asia markets. He has done training and engagements from New Zealand to Taiwan and points in between. About 60% of his time...

Pascal Tene
Updated 3 weeks ago by Pascal Tene
5 out of 5 stars

This is the second part of this article which provides guidelines for tightening the security of http traffic by leveraging the power of F5 Big-IP and  iRules to include the latest HTTP security headers to all HTTP responses.

Pascal Tene
Updated 4 weeks ago by Pascal Tene
5 out of 5 stars

In this article, I will give an overview of some important headers that can be added to HTTP responses in order to improve the security web applications.

Graham
Updated 1 month ago by Graham
5 out of 5 stars

With the new Office 365 sign-in experience you can capture the username entered at the O365 login page so users don't need to enter it twice!

Peter Silva
Updated 1 month ago by Peter Silva
5 out of 5 stars

Piotr Lewandowski has been working in IT for well over 20 years – and not really conscious decision to go this way – just blind luck. He started in the era without Internet…yes, not so long ago it was possible to live without Internet J…and IBM...

Peter Silva
Updated 2 months ago by Peter Silva
4 out of 5 stars

For almost two years Niels van Sluis has worked as a Security Engineer for Vosko Networking. Vosko's security team focuses on supporting security solutions from various vendors like F5, Check Point, Cisco and RSA. Niels focuses is on F5 BIG-IP...

Lori MacVittie
Updated 2 months ago by Lori MacVittie
5 out of 5 stars

Proxy API and Application traffic at high speeds with F5 BIG-IP. Lori MacVittie explains how.

martyscholes
Updated 2 months ago by martyscholes

Introduction Welcome to week three of the Kubernetes and BIG-IP series. In the previous article we learned how easy it is to deploy complex applications into Kubernetes running on Google Container Engine (GKE). As you might imagine, that...

Jason Rahm
Updated 4 months ago by Jason Rahm

My friend Bruce Hampton recently reached out with a problem he was facing with a BIG-IP Link Controller (LC) deployment. The problem? How do you persist the client address AND the snat address?

Gal Goldshtein
Updated 4 months ago by Gal Goldshtein
5 out of 5 stars

On Friday 12 May 2017 a large ransomware attack dubbed “WannaCry” was launched targeting more than 200,000 computers worldwide, including industries such as banks, hospitals and large telecom companies. Figure 1: “WannaCry” ransom...

Peter Silva
Updated 1 week ago by Peter Silva
5 out of 5 stars

Rob Carr is a Senior Trainer/Professional Services Consultant with Red Education Pty in Australia, covering the Oceania and Asia markets. He has done training and engagements from New Zealand to Taiwan and points in between. About 60% of his time...

Pascal Tene
Updated 3 weeks ago by Pascal Tene
5 out of 5 stars

This is the second part of this article which provides guidelines for tightening the security of http traffic by leveraging the power of F5 Big-IP and  iRules to include the latest HTTP security headers to all HTTP responses.

Pascal Tene
Updated 4 weeks ago by Pascal Tene
5 out of 5 stars

In this article, I will give an overview of some important headers that can be added to HTTP responses in order to improve the security web applications.

Graham
Updated 1 month ago by Graham
5 out of 5 stars

With the new Office 365 sign-in experience you can capture the username entered at the O365 login page so users don't need to enter it twice!

Peter Silva
Updated 1 month ago by Peter Silva
5 out of 5 stars

Piotr Lewandowski has been working in IT for well over 20 years – and not really conscious decision to go this way – just blind luck. He started in the era without Internet…yes, not so long ago it was possible to live without Internet J…and IBM...

Lori MacVittie
Updated 2 months ago by Lori MacVittie
5 out of 5 stars

Proxy API and Application traffic at high speeds with F5 BIG-IP. Lori MacVittie explains how.

Gal Goldshtein
Updated 4 months ago by Gal Goldshtein
5 out of 5 stars

On Friday 12 May 2017 a large ransomware attack dubbed “WannaCry” was launched targeting more than 200,000 computers worldwide, including industries such as banks, hospitals and large telecom companies. Figure 1: “WannaCry” ransom...

Payal
Updated 4 months ago by Payal
5 out of 5 stars

F5 BIG-IP iRules allow deep understanding and decision making within the MQTT protocol. Check out some use cases and more.

Peter Silva
Updated 4 months ago by Peter Silva
5 out of 5 stars

Leonardo is DevCentral’s Featured Member for May and we got a chance to talk with Leonardo about his life, work and scripting prowess.

Peter Silva
Updated 1/31/2017 by Peter Silva
5 out of 5 stars

Kai Wilke is a Principal Consultant for IT Security at itacs GmbH – a German consulting company located in Berlin City specializing in Microsoft security solutions, SharePoint deployments, and customizations as well as classical IT Consulting. He...

Have a iRules Question or Discussion Topic?

Answers

DNS Lookup Internet
Updated 20 minutes ago
0 votes
Redirect and hide redirect in browser
Updated 1 hour ago
0 votes
Multiple Cookies/Sessions same endpoint
Updated 9 hours ago
0 votes
Irule redirect issue with chrome
Updated 18 hours ago
0 votes