If you’re using Citrix StoreFront 2.6 and following the Citrix-VDI-iApp 2.0.0 deployment guide you may run into a snag while creating the Citrix Client Bundle for HTML 5 support (on page 45). In StoreFront 2.6 the Citrix HTML5 Receiver is no longer a standalone MSI file but is now bundled into the StoreFront 2.6 executable. […]
Author: cody
APM Cookbook: Multiple Domain Authentication – Part 2
In this series we examine ways to make APM authenticate against multiple Active Directory Domains. Part 1 discussed the use of a drop down menu on the APM login page. In Part 2 we use the user’s UPN to determine the correct domain for authentication. Note: If you are following along through the series I recommend […]
APM Client Side NTLM Authentication – 3 Things to Watch
APM has a nice feature that allows seamless authentication for domain joined machines by leveraging NTLM and/or Kerberos authentication. Michael Koyfman has a great article on DevCentral titled Leveraging BIG-IP APM for seamless client NTLM Authentication that will walk you through the steps. I’ve implemented this a few times and I wanted to share some […]
Protected: Agility 2014 – VDI the F5 Way (201) Lab Guide
There is no excerpt because this is a protected post.
F5 Networks – Agility 2014
Agility is F5 Networks’ annual user and partner conference that offers lab training session, product overviews and breakout sessions on hot topics. This year Agility is is being held in New York City at the Marriott Marquis in Time Square August 4th through the 6th. The Agility lab training sessions are all new this year […]
BIG-IP Troubleshooting 101
When you work with any technology there reaches a point where the “it’s a black box” approach is no longer valid and you have to dig in a little deeper and understand how the product works. With F5 BIG-IP this means understanding how traffic flows through the appliance and how to monitor and watch it. […]
Clustered Multi-processing (CMP) versus Traditional Shared Memory Architecture
Over on DevCentral Robert Haynes has posted a great article outlining the advantages of F5’s clustered multiprocessing (CMP) architecture versus traditional shared memory architecture. So why does this matter? Because attacks today are designed to stress the performance of security devices and bring them to their knees. If your architecture is designed correctly then it […]
SAML – Client versus Server Authentication with F5 APM
As organizations start to utilize Software as a Service (SaaS) the concern on how to authenticate users becomes a critical security issue. Many organizations look to federated authentication mechanisms, such as SAML, to help address this security risk. The benefits of using SAML are that user credentials are not replicated across each vendor cloud instance […]
Configuring and Testing an External Monitor
In follow-up to my post on Monitoring Access Policy Manager this post will walk you through how to assign the monitor to a GTM pool and simulate a down status to ensure GTM is configured correctly. If you do not know how to import the external monitor into GTM please reference SOL13423. Someone asked what […]
A Living Architecture
Originally posted on psilva's prophecies:
You often hear people say, ‘oh, this is a living document,’ to indicate that the information is continually updated or edited to reflect changes that may occur during the life of the document. Your infrastructure is also living and dynamic. You make changes, updates or upgrades to address the…