The mad dash to connect virtually every noun to the internet or the Internet
of Things is creating a massive M2M network for all the devices, systems,
sensors and actuators to connect & communicate on the Internet.
With that, they need a communications protocol to understand each other. One
of those is Message Queue Telemetry Transport (MQTT). MQTT is a “subscribe
and publish” messaging protocol designed for lightweight machine-to-machine
(or IoT) communications.
In this episode of Lightboard Lessons, I light up how MQTT works.
IoT Ready Infrastructure IoT Effect on Applications IoT Influence on Society
What are These "Things? The Intruders of Things
Internet [email protected], taking place June 6-8, 2017 at Javits Center, New
York City, is co-located with 20th [email protected] and will feature
technical sessions from a rock star conference facult... (more)
Azure Resource Manager (ARM) templates allow you to repeatedly deploy
applications with confidence. The resources are deployed in a consistent
state and you can easily manage and visualize resources for your application.
ARM templates take the guesswork out of creating repeatable applications and
environments. Deploy and deploy again, consistently.
Let’s walk through how to deploy a simple, single-NIC configuration of
BIG-IP VE in Microsoft Azure using an ARM template.
First, go to the F5 Networks Github site where we keep our supported
templates. There are other community-based templates at
www.github.com/f5devcentral if needed but for F5 supported templates, go to
the F5 Networks site.
To view Azure templates, click f5-azure-arm-templates. In that folder
you’ll see experimental and right under that is supported (the one you
Then click on the standalon... (more)
Patrik Jonsson lives in Stockholm with his wife and son and works as a
network engineer for a company providing online casino games across the
Outside work, he likes to spend time with his family, play around with his
home VMware lab and enjoys watching movies. He also loves travelling and
having a beer with friends.
Patrik is also a 2017 DevCentral MVP and DevCentral’s Featured Member for
April! DevCentral got a chance to talk with Patrik about his work, life and
his project the BIG-IP Report.
DevCentral: You’ve been a very active contributor to the DevCentral
community and wondered what keeps you involved?
Patrik: One of the best, and fun ways to learn new things is to take on
problems, or discussions presented by fellow technicians. It forces you to
continuously challenge what you think you know and keeps your knowledge up to
date. In addition, when I ne... (more)
The Consolidation of point devices and services in your datacenter or cloud
can help with cost, complexity, efficiency, management, provisioning and
troubleshooting your infrastructure and systems.
In this Lightboard Lesson, I light up many of the services you can
consolidate on BIG-IP.
The term ‘Proxy’ is a contraction that comes from the middle English word
procuracy, a legal term meaning to act on behalf of another. You may have
heard of a proxy vote. Where you submit your choice and someone else votes
the ballot on your behalf.
In networking and web traffic, a proxy is a device or server that acts on
behalf of other devices. It sits between two entities and performs a service.
Proxies are hardware or software solutions that sit between the client and
the server and does something to requests and sometimes responses.
The first kind of proxy we’ll discuss is a half proxy. With a Half-Proxy, a
client will connect to the proxy and the proxy will establish the session
with the servers. The proxy will then respond back to the client with the
information. After that initial connection is set up, the rest of the traffic
with go right through the proxy... (more)
Password fatigue is something we’ve all experienced at some point. Whether
it’s due to breaches and the ever present, ‘update password’ warnings,
the corporate policy of a 90-day rotation or simply registering for a website
with yet another unique username and password. Social login or social sign-in
allows people to use their existing Google, Twitter, Facebook, LinkedIn or
other social credentials to enter a web property, rather than creating a
whole new account for the site. These can be used to authenticate, verify
identity or to allow posting of content to social networks and the main
advantage is convenience and speed.
With v13, BIG-IP APM offers a rich set of OAuth capabilities allowing
organizations to implement OAuth Client, OAuth Resource Server and OAuth
Authorization Server roles to implement social logins.
Let’s look at BIG-IP’s capabilities (from the us... (more)
High Availability of applications is critical to an organization’s
On BIG-IP, HA Groups is a feature that allows BIG-IP to fail over
automatically based not on the health of the BIG-IP system itself but rather
on the health of external resources within a traffic group. These external
resources include the health and availability of pool members, trunk links,
VIPRION cluster members or a combination of all three. This is the only cause
of failover that is triggered based on resources outside of the BIG-IP.
An HA group is a configuration object you create and assign to a traffic
group for devices in a device group. An HA group defines health criteria for
a resource (such as an application server pool) that the traffic group uses.
With an HA group, the BIG-IP system can decide whether to keep a traffic
group active on its current device or fail over the traff... (more)
JANUARY 8, 2014 02:00 PM EST
When we talk about the impact of BYOD and BYOA and the Internet of Things, we
often focus on the impact on data center architectures. That's because there
will be an increasing need for authentication, for access control, for
security, for application delivery as the number of potential endpoints
(clients, devices, things) increases. That means scale in the data center.
What we gloss over, what we skip, is that before any of these "things" ever
makes a request to access an application it had to execute a DNS query.
Every. Single. Thing.
Maybe that's because we assume DNS can handle the load. So far it's done
well. You rarely, if ever, hear of disruptions or outages due directly to the
execution of DNS. Oh, there has been some issues with misconfiguration of DNS
and of exploitation of DNS (hijacking, illicit use in reflection attacks,
BIG-IP can manage application-specific network traffic in a variety of ways,
depending on the protocols and services being used. On BIG-IP, Profiles are a
set of tools that you can use to intelligently control the behavior of that
In this Lightboard Lesson, I light up the BIG-IP Profiles. What they are,
what they do and why you should care.
Lightboard Lessons: BIG-IP Basic Nomenclature Lightboard Lessons: Device
As more organizations use APIs in their systems, they’ve become targets for
the not-so-good-doers so API Security is something you need to take
seriously. Most APIs today use the HTTP protocol so organizations should
protect them as they would ordinary web properties.
Starting in v13, BIG-IP APM is able to act as an OAuth Client, OAuth Resource
Server and OAuth Authorization Server. In this example, we will show how to
use BIG-IP APM to act as an OAuth Resource Server protecting the API.
In our environment, we’ve published an API (api.f5se.com) and we’re
trying to get a list of departments in the HR database. The API is not
natively protected and we want APM to enable OAuth protection to this API.
First, let’s try an unauthenticated request.
You can see we get the 401 Unauthorized response which is coming from the
BIG-IP. In this instance we’re only sending 3 header... (more)
What is VDI?
Imagine not having to carry around a laptop or be sitting in a cubicle to
access your work desktop applications. Virtual desktop infrastructure (VDI)
is appealing to many different constituencies because it combines the
benefits of anywhere access with desktop support improvements.
Employees typically use a wide range of mobile devices from laptops to
tablets and from desktops to smartphones are being used. The diversity of
these mobile devices and the sheer number of them in the workplace can
overwhelm IT and strain your resources.
Desktop Virtualization centralizes sets of desktops, usually in a data center
or cloud environment, and then provide access to your employees whether they
are in the office, at home or mobile. VDI deployments virtualize user
desktops by delivering them to distinctive endpoint devices over the network
from a central locatio... (more)