F5 Partners join us for Partner Connect Quarterly Update: May 21 & 22
We are excited to invite you to the F5 Partner Connect Quarterly Update, an exclusive event designed to empower our partners with cutting-edge insights and strategic direction. Join us on May 21st and 22nd for a deep dive into F5's transformation journey and the unlocking of API security potential. May 21 12pm SGT: Asia Pacific, China, and Japan May 22: 2pm BST: Europe, Middle East, and Africa 11am PDT: Americas We will revisit F5’s evolution and reinforce our stance on API security, spotlighting our strategic acquisitions of WIB and Heyhack. Chuck Herrin, Senior Principal Product Manager for Security and former CTO at WIB, will delineate F5's forward-thinking approach in the application and API security landscape. Josh Goldfarb, Global Solutions Architect for Security will present 10 actionable best practices. These insights will help you, our valued partners, to maximize profitability and leverage F5’s innovative solutions for unparalleled market opportunities. Do not miss this chance to connect with F5 leaders and stay at the forefront of the security domain. Together, let's transform challenges into opportunities and elevate API security to new heights. Register Now!10Views0likes0CommentsHOW TO HIRE A HACKER TO RECOVER STOLEN BITCOIN. CONTACT FASTFUND RECOVERY
To be honest, whether lost bitcoin can be found or not depends on how it was lost and because of this, one needs a professional recovery expert like Fastfund Rcovery who will help you get back your lost bitcoin/funds. This Professional recovery Agent helped me recover my stolen 95,440 USD worth of bitcoin effortlessly. His service is not only quick but professional and reliable. I contacted Fastfund Recovery when I had invested in a fake crypto investment platform that cost me 95,440 USD Two months back. I saw an ad on Google on how one can invest on a certain investment platform and earn more and I thought the investment project was a great one that would yield me massive profit but I was wrong. I did invest because I had some cash saved for such an opportunity. I checked my account and I was glad that I indeed made a profit and now the problem came when it was time to withdraw the cash. I tried to withdraw the money for 3 days and that was when I discovered that I had to add more cash for the withdrawal. I promised myself I wouldn’t do this, and that’s when I contacted Fastfund Recovery. I discovered him through a positive review I saw and reached out to him via email. It was such a huge relief when he was able to recover my bitcoin funds. Contact his team today on: Fastfundrecovery8@gmail.com Telegram:@fastfundsrecovery website :fastfvndrecovery.com12Views0likes0CommentsProblems connecting to vpn after upgrading to ubuntu 24.04
good afternoon, I have upgraded ubuntu to 24.04 and since then I can no longer connect correctly to the vpn with the f5 client. In the client it appears that I am connected to the vpn, but then I do not reach any of the sites and servers that with the 22.04 version if it arrived. Can you help me.18Views0likes0CommentsUsing okta as SSO to login F5 GUI
Hi All, Greetings..!! Currently we are using local user accounts in f5 to login. We have different users with different roles on f5. In our organization we are using okta for other apps authentication. Is it possible to have Okta for logging in f5 with SSO. If yes, please share the article or guide with the required configurations. Thanks in Advance, K Kuzhali25Views0likes1CommentWeb acceleration
We have a Web acceleration setup on the virtual server with HTTP profile set to http If we change the http profile to 'None' does it set the filed 'Web acceleration profile' also to 'None' ? Is both http.proflr and Web acceleration profile fields dependent ? Thanks in advance27Views0likes2CommentsContent type hearder charset=UTF-8
Hello friends, We have a requirement to have WAF should only allow charset=UTF-8 in the Content-Type header. So curios does this cover by any rule in ASM policy or do we have to create a custom rule through iRule or other ? Basically our objective to accept only ute-8 and reject rest of any. Appreciate any inputs !!40Views0likes3CommentsLDAPS and renegotiation
Hello, hope everyone is well! we have a requirement to present 2 different issuer/signed certificates based on the incoming client IP. I am pretty sure from an HTTP perspective I would do something like this when CLIENT_ACCEPTED { if {([class match [IP::client_addr] eq signer_list_of_client_A_IPs]) } { SSL::profile cert_with_issuer_type_A } else { SSL::profile cert_with_issuer_type_B } } when HTTP_REQUEST { SSL::renegotiate } Question I have is whether this would work for LDAPS clients and how (if needed at all) the renegotiation step would be achieved, given that the HTTP_REQUEST will not be available. Many thanks Jon18Views0likes2CommentsNeed help on i-rule to specific uri path
Hello All, I'm working on an i-rule that I need to do the following; given a set of specific source ip addresses, only allow access to specific uris of /ws/rest/external*. I set the specific source addresses in a data group, referencing the data group. When I apply this i-rule to the virtual server, on testing I get an Insecure HTTPS message. I am on version 15.8.1.2. We plan to upgrade to most stable release on 16 soon. Any suggestions on what I can do with the i-rule posted below? Thanks in advance. when CLIENT_ACCEPTED { if { [class match [IP::client_addr] equals Boomi_external] } { pool esd-bmapi-dc1-as01-f5.lanl.gov_8077_pool } } when HTTP_REQUEST { if ![HTTP::has_responded] { if { ([HTTP::host] equals "apigway-d.lanl.gov" or [HTTP::host] equals "apigway-d.lanl.gov") } { if { [HTTP::uri] starts_with "/ws/rest/external* " || [HTTP::uri] starts_with "/ws/rest/external*" } { pool esd-bmapi-dc1-as01-f5.lanl.gov_8077_pool } else { reject } return } } }29Views0likes2CommentsASM - Parent policy vs OWASPcompliance
Hi folks, I am implementing a WAF in my company and I would like to work with parent and child policies. This way, if we need to add something in general, I can apply it to the parent policy and it will replicate this change to the child policies, instead of going one by one and applying it individually. However, I found out that "Parent and Child Security Policies are not supported by the OWASP Top 10 compliance dashboard." So, I would like to know what the best approach is. Is it worth going ahead with the parent and child policies and ignore the OWASP compliance dashboard? Or, in terms of security, is it better to create a normal ASM policy without parent or child relationships?19Views0likes0Comments