Learn F5 Technologies, Get Answers & Share Community Solutions Join DevCentral

Local Traffic Manager (LTM)

BIG-IP Local Traffic Manager increases operational efficiency and ensures peak network performance. Say hello to the flexibility of managing your physical, virtual, and cloud infrastructure.

Learn more

Articles

Martin Duke
Updated 1 week ago by Martin Duke
5 out of 5 stars

Picking the right buffer size can be hard. Turning on autobuffer tuning is easy.

Lori MacVittie
Updated 1 week ago by Lori MacVittie

Inline, side-arm, reverse, and forward. These used to be the terms we used to describe the architectural placement of proxies in the network.   Today, containers use some of the same terminology, but are introducing new ones. That’s an...

Payal
Updated 2 weeks ago by Payal

The "Internet of Things" (IoT) has the potential to not just impact the way we live and work, but to disrupt entire industries. Some of the major industries that are driving innovation in IoT include manufacturing, transportation, and...

John Wagnon
Updated 3 weeks ago by John Wagnon
5 out of 5 stars

John discusses HTTP redirects using datagroups and iRules.

Lori MacVittie
Updated 1 month ago by Lori MacVittie
5 out of 5 stars

Containers continue to be a hot topic. Some claim they are on the verge of a meteoric rise to dominate the data center. Others find them only suitable for cloud. And still others are waiting patiently to see if containers is the SDN of app...

John Wagnon
Updated 1 month ago by John Wagnon
5 out of 5 stars

For some web applications, you need a separate network firewall policy for users from different geographic locations.  Using the power of iRules and VIP-targeting-VIP solutions, you can dynamically select an AFM policy based on source IP geolocation.

Pascal Tene
Updated 1 month ago by Pascal Tene

Part 3:   Headers to remove   Server and X-Powered-by headers The Server and X-Powered-By headers:  Should be removed or changed These are added by default by some web servers such as apache, nginx, Express,…   Example:...

Pascal Tene
Updated 1 month ago by Pascal Tene
4 out of 5 stars

This is the second part of this article which provides guidelines for tightening the security of http traffic by leveraging the power of F5 Big-IP and  iRules to include the latest HTTP security headers to all HTTP responses.

Lori MacVittie
Updated 2 months ago by Lori MacVittie

The introduction of containers and clustering, with its self-contained ecosystem of load balancers, ingress controllers, and proxies can be confusing. That’s because they insert themselves into a well-understood, connection-oriented flow (TCP)...

Matt Mabis
Updated 2 months ago by Matt Mabis

Provide a Technical update on some new hotfixes that were rolled out to resolve some issues with HTML5 connectivity with Horizon 7.1 and 7.2 with APM.

Martin Duke
Updated 1 week ago by Martin Duke
5 out of 5 stars

Picking the right buffer size can be hard. Turning on autobuffer tuning is easy.

John Wagnon
Updated 3 weeks ago by John Wagnon
5 out of 5 stars

John discusses HTTP redirects using datagroups and iRules.

Lori MacVittie
Updated 1 month ago by Lori MacVittie
5 out of 5 stars

Containers continue to be a hot topic. Some claim they are on the verge of a meteoric rise to dominate the data center. Others find them only suitable for cloud. And still others are waiting patiently to see if containers is the SDN of app...

John Wagnon
Updated 1 month ago by John Wagnon
5 out of 5 stars

For some web applications, you need a separate network firewall policy for users from different geographic locations.  Using the power of iRules and VIP-targeting-VIP solutions, you can dynamically select an AFM policy based on source IP geolocation.

Nate ƒlagg
Updated 3 months ago by Nate ƒlagg
5 out of 5 stars

On a Big-IP in the Standby state (if there are more than one Big-IP in the device group), perform the following:Note: Verify the device is still in the Standby state and not Offline (unless purposely) or Active. Log in to the Configuration...

Nate ƒlagg
Updated 3 months ago by Nate ƒlagg
5 out of 5 stars

To What Big-IP Versions Can I Upgrade? Big-IP 10.x can be upgraded to any version of 11.x given your hardware supports the new version. Big-IP 11.x can be upgraded to any version of 12.x given your hardware supports the new version. You canno...

Nate ƒlagg
Updated 3 months ago by Nate ƒlagg
5 out of 5 stars

How Big-IP Upgrades Work Software images can be installed to any software volume except the running volume. This behavior ensures the running software volume is available should a need arise to revert to the prior Big-IP version and...

Nate ƒlagg
Updated 3 months ago by Nate ƒlagg
5 out of 5 stars

The information is this series is meant to help a Big-IP administrator complete a software upgrade. I have assisted with hundreds of Big-IP upgrades and hope to help you complete the task as smoothly as possible.

Lori MacVittie
Updated 3 months ago by Lori MacVittie
5 out of 5 stars

Proxy API and Application traffic at high speeds with F5 BIG-IP. Lori MacVittie explains how.

John Wagnon
Updated 5 months ago by John Wagnon
5 out of 5 stars

Perfect Forward Secrecy is a great security feature for web applications, but it can have some unexpected side effects.

Have a LTM Question or Discussion Topic?