CINXE.COM

Tag:"security" | DevCentral

<!DOCTYPE html><html lang="en-US"><head><meta charSet="utf-8"/><meta name="viewport" content="width=device-width"/><link rel="icon" href="https://community.f5.com/t5/s/zihoc95639/m_assets/themes/customTheme1/JimmyPackets-512-1702592938213.png?time=1702592945815&amp;image-dimensions=32x32" type="image/png" crossorigin="use-credentials"/><link rel="apple-touch-icon" href="https://community.f5.com/t5/s/zihoc95639/m_assets/themes/customTheme1/JimmyPackets-512-1702592938213.png?time=1702592945815&amp;image-dimensions=180x180" type="image/png" crossorigin="use-credentials"/><link rel="manifest" href="/manifest.webmanifest/customTheme1/1740169745569" crossorigin="use-credentials"/><style>@font-face { font-family: "Atkinson Hyperlegible"; font-style: normal; font-weight: 400; font-display: swap; src: local("Atkinson Hyperlegible-normal-400"), url("/static/fonts/googleFonts/AtkinsonHyperlegible-normal-400.woff2") format('woff2'); } @font-face { font-family: "Atkinson Hyperlegible"; font-style: normal; font-weight: 700; font-display: swap; src: local("Atkinson Hyperlegible-normal-700"), url("/static/fonts/googleFonts/AtkinsonHyperlegible-normal-700.woff2") format('woff2'); } @font-face { font-family: "Inter"; font-style: normal; font-weight: 300; font-display: swap; src: local("Inter-normal-300"), url("/static/fonts/googleFonts/Inter-normal-300.woff2") format('woff2'); } @font-face { font-family: "Inter"; font-style: normal; font-weight: 400; font-display: swap; src: local("Inter-normal-400"), url("/static/fonts/googleFonts/Inter-normal-400.woff2") format('woff2'); } @font-face { font-family: "Inter"; font-style: normal; font-weight: 500; font-display: swap; src: local("Inter-normal-500"), url("/static/fonts/googleFonts/Inter-normal-500.woff2") format('woff2'); } @font-face { font-family: "Inter"; font-style: normal; font-weight: 600; font-display: swap; src: local("Inter-normal-600"), url("/static/fonts/googleFonts/Inter-normal-600.woff2") format('woff2'); }</style><style type="text/css">:root { --lia-vars-loaded: flex;--lia-body-margin: 0 auto;--lia-body-max-width: 1600px;--lia-container-max-width: 1600px;--lia-one-column-narrow-width: 800px;--lia-grid-gutter-width-md: 30px;--lia-grid-gutter-width-xs: 10px;--lia-bs-black-h: 0;--lia-bs-black-s: 0%;--lia-bs-black-l: 0%;--lia-bs-black: hsl(var(--lia-bs-black-h), var(--lia-bs-black-s), var(--lia-bs-black-l));--lia-bs-white-h: 0;--lia-bs-white-s: 0%;--lia-bs-white-l: 100%;--lia-bs-white: hsl(var(--lia-bs-white-h), var(--lia-bs-white-s), var(--lia-bs-white-l));--lia-bs-gray-100-h: 0;--lia-bs-gray-100-s: 0%;--lia-bs-gray-100-l: 96.86274509803921%;--lia-bs-gray-100: hsl(var(--lia-bs-gray-100-h), var(--lia-bs-gray-100-s), var(--lia-bs-gray-100-l));--lia-bs-gray-200-h: 0;--lia-bs-gray-200-s: 0%;--lia-bs-gray-200-l: 96.86274509803921%;--lia-bs-gray-200: hsl(var(--lia-bs-gray-200-h), var(--lia-bs-gray-200-s), var(--lia-bs-gray-200-l));--lia-bs-gray-300-h: 0;--lia-bs-gray-300-s: 0%;--lia-bs-gray-300-l: 90.98039215686275%;--lia-bs-gray-300: hsl(var(--lia-bs-gray-300-h), var(--lia-bs-gray-300-s), var(--lia-bs-gray-300-l));--lia-bs-gray-400-h: 0;--lia-bs-gray-400-s: 0%;--lia-bs-gray-400-l: 85.09803921568627%;--lia-bs-gray-400: hsl(var(--lia-bs-gray-400-h), var(--lia-bs-gray-400-s), var(--lia-bs-gray-400-l));--lia-bs-gray-500-h: 0;--lia-bs-gray-500-s: 0%;--lia-bs-gray-500-l: 80%;--lia-bs-gray-500: hsl(var(--lia-bs-gray-500-h), var(--lia-bs-gray-500-s), var(--lia-bs-gray-500-l));--lia-bs-gray-600-h: 0;--lia-bs-gray-600-s: 0%;--lia-bs-gray-600-l: 58.03921568627452%;--lia-bs-gray-600: hsl(var(--lia-bs-gray-600-h), var(--lia-bs-gray-600-s), var(--lia-bs-gray-600-l));--lia-bs-gray-700-h: 0;--lia-bs-gray-700-s: 0%;--lia-bs-gray-700-l: 43.92156862745098%;--lia-bs-gray-700: hsl(var(--lia-bs-gray-700-h), var(--lia-bs-gray-700-s), var(--lia-bs-gray-700-l));--lia-bs-gray-800-h: 0;--lia-bs-gray-800-s: 0%;--lia-bs-gray-800-l: 32.94117647058823%;--lia-bs-gray-800: hsl(var(--lia-bs-gray-800-h), var(--lia-bs-gray-800-s), var(--lia-bs-gray-800-l));--lia-bs-gray-900-h: 0;--lia-bs-gray-900-s: 0%;--lia-bs-gray-900-l: 20%;--lia-bs-gray-900: hsl(var(--lia-bs-gray-900-h), var(--lia-bs-gray-900-s), var(--lia-bs-gray-900-l));--lia-bs-dark-h: 0;--lia-bs-dark-s: 0%;--lia-bs-dark-l: 32.94117647058823%;--lia-bs-dark: hsl(var(--lia-bs-dark-h), var(--lia-bs-dark-s), var(--lia-bs-dark-l));--lia-bs-light-h: 0;--lia-bs-light-s: 0%;--lia-bs-light-l: 96.86274509803921%;--lia-bs-light: hsl(var(--lia-bs-light-h), var(--lia-bs-light-s), var(--lia-bs-light-l));--lia-bs-primary-h: 202.79069767441865;--lia-bs-primary-s: 84.31372549019606%;--lia-bs-primary-l: 30.000000000000004%;--lia-bs-primary: hsl(var(--lia-bs-primary-h), var(--lia-bs-primary-s), var(--lia-bs-primary-l));--lia-bs-secondary-h: 0;--lia-bs-secondary-s: 0%;--lia-bs-secondary-l: 20%;--lia-bs-secondary: hsl(var(--lia-bs-secondary-h), var(--lia-bs-secondary-s), var(--lia-bs-secondary-l));--lia-bs-body-bg-h: 0;--lia-bs-body-bg-s: 0%;--lia-bs-body-bg-l: 96.07843137254902%;--lia-bs-body-bg: hsl(var(--lia-bs-body-bg-h), var(--lia-bs-body-bg-s), var(--lia-bs-body-bg-l));--lia-bs-body-color-h: 0;--lia-bs-body-color-s: 0%;--lia-bs-body-color-l: 13.333333333333334%;--lia-bs-body-color: hsl(var(--lia-bs-body-color-h), var(--lia-bs-body-color-s), var(--lia-bs-body-color-l));--lia-bs-info-h: 198.13186813186815;--lia-bs-info-s: 75.83333333333331%;--lia-bs-info-l: 47.05882352941176%;--lia-bs-info: hsl(var(--lia-bs-info-h), var(--lia-bs-info-s), var(--lia-bs-info-l));--lia-bs-success-h: 96.6233766233766;--lia-bs-success-s: 66.95652173913042%;--lia-bs-success-l: 45.09803921568628%;--lia-bs-success: hsl(var(--lia-bs-success-h), var(--lia-bs-success-s), var(--lia-bs-success-l));--lia-bs-warning-h: 45.86206896551721;--lia-bs-warning-s: 100%;--lia-bs-warning-l: 65.88235294117646%;--lia-bs-warning: hsl(var(--lia-bs-warning-h), var(--lia-bs-warning-s), var(--lia-bs-warning-l));--lia-bs-danger-h: 348.5567010309278;--lia-bs-danger-s: 100%;--lia-bs-danger-l: 38.03921568627451%;--lia-bs-danger: hsl(var(--lia-bs-danger-h), var(--lia-bs-danger-s), var(--lia-bs-danger-l));--lia-alert-system-color-h: 24;--lia-alert-system-color-s: 100%;--lia-alert-system-color-l: 50%;--lia-alert-system-color: hsl(var(--lia-alert-system-color-h), var(--lia-alert-system-color-s), var(--lia-alert-system-color-l));--lia-bs-text-muted-h: 0;--lia-bs-text-muted-s: 0%;--lia-bs-text-muted-l: 43.92156862745098%;--lia-bs-text-muted: hsl(var(--lia-bs-text-muted-h), var(--lia-bs-text-muted-s), var(--lia-bs-text-muted-l));--lia-highlight-color-h: 57.804878048780495;--lia-highlight-color-s: 100%;--lia-highlight-color-l: 83.92156862745098%;--lia-highlight-color: hsl(var(--lia-highlight-color-h), var(--lia-highlight-color-s), var(--lia-highlight-color-l));--lia-outline-color: var(--lia-bs-primary);--lia-bs-font-size-base: 15px;--lia-bs-font-size-sm: 13px;--lia-font-size-xxs: 11px;--lia-font-size-xs: 12px;--lia-bs-font-size-lg: 20px;--lia-bs-small-font-size: 14px;--lia-font-size-xl: 24px;--lia-bs-font-family-base: Atkinson Hyperlegible, system-ui;--lia-bs-font-weight-base: 400;--lia-bs-font-weight-light: 300;--lia-bs-font-weight-normal: 400;--lia-font-weight-md: 500;--lia-bs-font-weight-bold: 700;--lia-font-style-base: normal;--lia-bs-line-height-base: 1.3;--lia-bs-h1-font-size: 30px;--lia-bs-h2-font-size: 25px;--lia-bs-h3-font-size: 20px;--lia-bs-h4-font-size: 18px;--lia-bs-h5-font-size: 16px;--lia-bs-h6-font-size: 16px;--lia-bs-headings-font-family: Inter, system-ui;--lia-bs-headings-line-height: 1.2;--lia-bs-headings-font-weight: 600;--lia-headings-font-style: normal;--lia-subheader-font-size: 11px;--lia-subheader-font-weight: 500;--lia-bs-headings-color: var(--lia-bs-body-color);--lia-h1-letter-spacing: normal;--lia-h2-letter-spacing: normal;--lia-h3-letter-spacing: normal;--lia-h4-letter-spacing: normal;--lia-h5-letter-spacing: normal;--lia-h6-letter-spacing: normal;--lia-letter-spacing-subheading: 2px;--lia-letter-spacing-sm: normal;--lia-letter-spacing-xs: normal;--lia-h1-font-weight: var(--lia-bs-headings-font-weight);--lia-h2-font-weight: var(--lia-bs-headings-font-weight);--lia-h3-font-weight: var(--lia-bs-headings-font-weight);--lia-h4-font-weight: var(--lia-bs-headings-font-weight);--lia-h5-font-weight: var(--lia-bs-headings-font-weight);--lia-h6-font-weight: var(--lia-bs-headings-font-weight);--lia-btn-font-style: normal;--lia-bs-btn-font-weight: 400;--lia-btn-text-transform: none;--lia-bs-btn-disabled-opacity: 0.5;--lia-bs-btn-border-radius-sm: 5px;--lia-bs-btn-border-radius: 5px;--lia-bs-btn-border-radius-lg: 5px;--lia-bs-btn-padding-x: 12px;--lia-bs-btn-padding-x-lg: 14px;--lia-btn-padding-x-hero: 42px;--lia-bs-btn-padding-y: 5px;--lia-bs-btn-padding-y-lg: 7px;--lia-btn-padding-y-hero: var(--lia-bs-btn-padding-y-lg);--lia-btn-primary-text-color: var(--lia-bs-white);--lia-btn-primary-text-hover-color: var(--lia-bs-white);--lia-btn-primary-text-active-color: var(--lia-bs-white);--lia-btn-primary-bg-color: var(--lia-bs-primary);--lia-btn-primary-bg-hover-color: hsl(var(--lia-bs-primary-h), var(--lia-bs-primary-s), calc(var(--lia-bs-primary-l) * 0.85));--lia-btn-primary-bg-active-color: hsl(var(--lia-bs-primary-h), var(--lia-bs-primary-s), calc(var(--lia-bs-primary-l) * 0.7));--lia-btn-primary-border: 1px solid transparent;--lia-btn-primary-border-hover: 1px solid transparent;--lia-btn-primary-border-active: 1px solid transparent;--lia-btn-primary-border-focus: 1px solid var(--lia-bs-white);--lia-btn-primary-box-shadow-focus: 0 0 0 1px var(--lia-bs-primary), 0 0 0 4px hsla(var(--lia-bs-primary-h), var(--lia-bs-primary-s), var(--lia-bs-primary-l), 0.2);--lia-btn-secondary-text-color: var(--lia-bs-gray-900);--lia-btn-secondary-text-hover-color: hsl(var(--lia-bs-gray-900-h), var(--lia-bs-gray-900-s), calc(var(--lia-bs-gray-900-l) * 0.95));--lia-btn-secondary-text-active-color: hsl(var(--lia-bs-gray-900-h), var(--lia-bs-gray-900-s), calc(var(--lia-bs-gray-900-l) * 0.9));--lia-btn-secondary-bg-color: var(--lia-bs-gray-400);--lia-btn-secondary-bg-hover-color: hsl(var(--lia-bs-gray-400-h), var(--lia-bs-gray-400-s), calc(var(--lia-bs-gray-400-l) * 0.96));--lia-btn-secondary-bg-active-color: hsl(var(--lia-bs-gray-400-h), var(--lia-bs-gray-400-s), calc(var(--lia-bs-gray-400-l) * 0.92));--lia-btn-secondary-border: 1px solid transparent;--lia-btn-secondary-border-hover: 1px solid transparent;--lia-btn-secondary-border-active: 1px solid transparent;--lia-btn-secondary-border-focus: 1px solid transparent;--lia-btn-secondary-box-shadow-focus: 0 0 0 1px var(--lia-bs-primary), 0 0 0 4px hsla(var(--lia-bs-primary-h), var(--lia-bs-primary-s), var(--lia-bs-primary-l), 0.2);--lia-btn-tertiary-text-color: var(--lia-bs-gray-900);--lia-btn-tertiary-text-hover-color: hsl(var(--lia-bs-gray-900-h), var(--lia-bs-gray-900-s), calc(var(--lia-bs-gray-900-l) * 0.95));--lia-btn-tertiary-text-active-color: hsl(var(--lia-bs-gray-900-h), var(--lia-bs-gray-900-s), calc(var(--lia-bs-gray-900-l) * 0.9));--lia-btn-tertiary-bg-color: transparent;--lia-btn-tertiary-bg-hover-color: transparent;--lia-btn-tertiary-bg-active-color: hsla(var(--lia-bs-black-h), var(--lia-bs-black-s), var(--lia-bs-black-l), 0.04);--lia-btn-tertiary-border: 1px solid transparent;--lia-btn-tertiary-border-hover: 1px solid hsla(var(--lia-bs-black-h), var(--lia-bs-black-s), var(--lia-bs-black-l), 0.08);--lia-btn-tertiary-border-active: 1px solid transparent;--lia-btn-tertiary-border-focus: 1px solid transparent;--lia-btn-tertiary-box-shadow-focus: 0 0 0 1px var(--lia-bs-primary), 0 0 0 4px hsla(var(--lia-bs-primary-h), var(--lia-bs-primary-s), var(--lia-bs-primary-l), 0.2);--lia-btn-destructive-text-color: var(--lia-bs-danger);--lia-btn-destructive-text-hover-color: hsl(var(--lia-bs-danger-h), var(--lia-bs-danger-s), calc(var(--lia-bs-danger-l) * 0.95));--lia-btn-destructive-text-active-color: hsl(var(--lia-bs-danger-h), var(--lia-bs-danger-s), calc(var(--lia-bs-danger-l) * 0.9));--lia-btn-destructive-bg-color: var(--lia-bs-gray-300);--lia-btn-destructive-bg-hover-color: hsl(var(--lia-bs-gray-300-h), var(--lia-bs-gray-300-s), calc(var(--lia-bs-gray-300-l) * 0.96));--lia-btn-destructive-bg-active-color: hsl(var(--lia-bs-gray-300-h), var(--lia-bs-gray-300-s), calc(var(--lia-bs-gray-300-l) * 0.92));--lia-btn-destructive-border: 1px solid transparent;--lia-btn-destructive-border-hover: 1px solid transparent;--lia-btn-destructive-border-active: 1px solid transparent;--lia-btn-destructive-border-focus: 1px solid transparent;--lia-btn-destructive-box-shadow-focus: 0 0 0 1px var(--lia-bs-primary), 0 0 0 4px hsla(var(--lia-bs-primary-h), var(--lia-bs-primary-s), var(--lia-bs-primary-l), 0.2);--lia-bs-border-color: hsla(var(--lia-bs-black-h), var(--lia-bs-black-s), var(--lia-bs-black-l), 0.08);--lia-bs-border-radius-sm: 3px;--lia-bs-border-radius: 5px;--lia-bs-border-radius-lg: 9px;--lia-border-radius-50: 100vw;--lia-content-item-border: none;--lia-box-shadow-xs: 0 0 0 1px hsla(var(--lia-bs-gray-900-h), var(--lia-bs-gray-900-s), var(--lia-bs-gray-900-l), 0.08), 0 3px 0 -1px hsla(var(--lia-bs-gray-900-h), var(--lia-bs-gray-900-s), var(--lia-bs-gray-900-l), 0.08);--lia-bs-box-shadow-sm: 0 2px 4px hsla(var(--lia-bs-gray-900-h), var(--lia-bs-gray-900-s), var(--lia-bs-gray-900-l), 0.06);--lia-bs-box-shadow: 0 5px 15px hsla(var(--lia-bs-gray-900-h), var(--lia-bs-gray-900-s), var(--lia-bs-gray-900-l), 0.15);--lia-bs-box-shadow-lg: 0 10px 30px hsla(var(--lia-bs-gray-900-h), var(--lia-bs-gray-900-s), var(--lia-bs-gray-900-l), 0.15);--lia-bs-link-color: var(--lia-bs-primary);--lia-bs-link-hover-color: hsl(var(--lia-bs-primary-h), var(--lia-bs-primary-s), calc(var(--lia-bs-primary-l) - 10%));--lia-bs-link-decoration: none;--lia-bs-link-hover-decoration: underline;--lia-timing-fast: 150ms;--lia-timing-normal: 250ms;--lia-timing-slow: 500ms;--lia-timing-slowest: 750ms;--lia-timing-function: cubic-bezier(0.07, 0.91, 0.51, 1);--lia-avatar-border-radius: 50%;--lia-default-message-font-style: NORMAL;--lia-default-message-font-weight: 400;--lia-default-message-link-color: var(--lia-bs-primary);--lia-default-message-link-decoration: none;--lia-default-message-link-font-weight: 400;--lia-default-message-link-font-style: NORMAL;--lia-forum-color-h: 202.79069767441865;--lia-forum-color-s: 84.31372549019606%;--lia-forum-color-l: 30.000000000000004%;--lia-forum-color: hsl(var(--lia-forum-color-h), var(--lia-forum-color-s), var(--lia-forum-color-l));--lia-forum-font-family: var(--lia-bs-font-family-base);--lia-forum-font-weight: var(--lia-default-message-font-weight);--lia-forum-line-height: var(--lia-bs-line-height-base);--lia-forum-font-style: var(--lia-default-message-font-style);--lia-forum-message-link-color: var(--lia-default-message-link-color);--lia-forum-message-link-decoration: var(--lia-default-message-link-decoration);--lia-forum-message-link-font-style: var(--lia-default-message-link-font-style);--lia-forum-message-link-font-weight: var(--lia-default-message-link-font-weight);--lia-forum-solved-color-h: 96.6233766233766;--lia-forum-solved-color-s: 66.95652173913042%;--lia-forum-solved-color-l: 45.09803921568628%;--lia-forum-solved-color: hsl(var(--lia-forum-solved-color-h), var(--lia-forum-solved-color-s), var(--lia-forum-solved-color-l));--lia-blog-color-h: 349.0434782608695;--lia-blog-color-s: 100%;--lia-blog-color-l: 22.54901960784314%;--lia-blog-color: hsl(var(--lia-blog-color-h), var(--lia-blog-color-s), var(--lia-blog-color-l));--lia-blog-font-family: var(--lia-bs-font-family-base);--lia-blog-font-weight: var(--lia-default-message-font-weight);--lia-blog-line-height: 1.75;--lia-blog-font-style: var(--lia-default-message-font-style);--lia-blog-message-link-color: var(--lia-default-message-link-color);--lia-blog-message-link-decoration: var(--lia-default-message-link-decoration);--lia-blog-message-link-font-style: var(--lia-default-message-link-font-style);--lia-blog-message-link-font-weight: var(--lia-default-message-link-font-weight);--lia-tkb-color-h: 348.5567010309278;--lia-tkb-color-s: 100%;--lia-tkb-color-l: 38.03921568627451%;--lia-tkb-color: hsl(var(--lia-tkb-color-h), var(--lia-tkb-color-s), var(--lia-tkb-color-l));--lia-tkb-font-family: var(--lia-bs-font-family-base);--lia-tkb-font-weight: var(--lia-default-message-font-weight);--lia-tkb-line-height: 1.75;--lia-tkb-font-style: var(--lia-default-message-font-style);--lia-tkb-message-link-color: var(--lia-default-message-link-color);--lia-tkb-message-link-decoration: var(--lia-default-message-link-decoration);--lia-tkb-message-link-font-style: var(--lia-default-message-link-font-style);--lia-tkb-message-link-font-weight: var(--lia-default-message-link-font-weight);--lia-qanda-color-h: 207.03703703703695;--lia-qanda-color-s: 73.63636363636363%;--lia-qanda-color-l: 56.86274509803921%;--lia-qanda-color: hsl(var(--lia-qanda-color-h), var(--lia-qanda-color-s), var(--lia-qanda-color-l));--lia-qanda-font-family: var(--lia-bs-font-family-base);--lia-qanda-font-weight: var(--lia-default-message-font-weight);--lia-qanda-line-height: var(--lia-bs-line-height-base);--lia-qanda-font-style: var(--lia-default-message-link-font-style);--lia-qanda-message-link-color: var(--lia-default-message-link-color);--lia-qanda-message-link-decoration: var(--lia-default-message-link-decoration);--lia-qanda-message-link-font-style: var(--lia-default-message-link-font-style);--lia-qanda-message-link-font-weight: var(--lia-default-message-link-font-weight);--lia-qanda-solved-color: #3FA023;--lia-idea-color-h: 13.214285714285722;--lia-idea-color-s: 87.49999999999999%;--lia-idea-color-l: 62.35294117647059%;--lia-idea-color: hsl(var(--lia-idea-color-h), var(--lia-idea-color-s), var(--lia-idea-color-l));--lia-idea-font-family: var(--lia-bs-font-family-base);--lia-idea-font-weight: var(--lia-default-message-font-weight);--lia-idea-line-height: var(--lia-bs-line-height-base);--lia-idea-font-style: var(--lia-default-message-font-style);--lia-idea-message-link-color: var(--lia-default-message-link-color);--lia-idea-message-link-decoration: var(--lia-default-message-link-decoration);--lia-idea-message-link-font-style: var(--lia-default-message-link-font-style);--lia-idea-message-link-font-weight: var(--lia-default-message-link-font-weight);--lia-contest-color-h: 42.95081967213116;--lia-contest-color-s: 96.82539682539684%;--lia-contest-color-l: 62.94117647058823%;--lia-contest-color: hsl(var(--lia-contest-color-h), var(--lia-contest-color-s), var(--lia-contest-color-l));--lia-contest-font-family: var(--lia-bs-font-family-base);--lia-contest-font-weight: var(--lia-default-message-font-weight);--lia-contest-line-height: var(--lia-bs-line-height-base);--lia-contest-font-style: var(--lia-default-message-link-font-style);--lia-contest-message-link-color: var(--lia-default-message-link-color);--lia-contest-message-link-decoration: var(--lia-default-message-link-decoration);--lia-contest-message-link-font-style: ITALIC;--lia-contest-message-link-font-weight: var(--lia-default-message-link-font-weight);--lia-occasion-color-h: 354.11042944785277;--lia-occasion-color-s: 82.74111675126903%;--lia-occasion-color-l: 61.372549019607845%;--lia-occasion-color: hsl(var(--lia-occasion-color-h), var(--lia-occasion-color-s), var(--lia-occasion-color-l));--lia-occasion-font-family: var(--lia-bs-font-family-base);--lia-occasion-font-weight: var(--lia-default-message-font-weight);--lia-occasion-line-height: var(--lia-bs-line-height-base);--lia-occasion-font-style: var(--lia-default-message-font-style);--lia-occasion-message-link-color: var(--lia-default-message-link-color);--lia-occasion-message-link-decoration: var(--lia-default-message-link-decoration);--lia-occasion-message-link-font-style: var(--lia-default-message-link-font-style);--lia-occasion-message-link-font-weight: var(--lia-default-message-link-font-weight);--lia-grouphub-color-h: 278.87323943661977;--lia-grouphub-color-s: 56.8%;--lia-grouphub-color-l: 24.50980392156863%;--lia-grouphub-color: hsl(var(--lia-grouphub-color-h), var(--lia-grouphub-color-s), var(--lia-grouphub-color-l));--lia-category-color-h: 0;--lia-category-color-s: 0%;--lia-category-color-l: 58.03921568627452%;--lia-category-color: hsl(var(--lia-category-color-h), var(--lia-category-color-s), var(--lia-category-color-l));--lia-community-color-h: 0;--lia-community-color-s: 0%;--lia-community-color-l: 100%;--lia-community-color: hsl(var(--lia-community-color-h), var(--lia-community-color-s), var(--lia-community-color-l));--lia-product-color-h: 0;--lia-product-color-s: 0%;--lia-product-color-l: 58.03921568627452%;--lia-product-color: hsl(var(--lia-product-color-h), var(--lia-product-color-s), var(--lia-product-color-l));--lia-panel-bg-color: var(--lia-bs-white);--lia-panel-border-radius: var(--lia-bs-border-radius);--lia-panel-border-color: var(--lia-bs-border-color);--lia-panel-box-shadow: none;--lia-card-bg-color: var(--lia-panel-bg-color);--lia-card-border-radius: var(--lia-panel-border-radius);--lia-card-box-shadow: var(--lia-box-shadow-xs);--lia-bs-modal-content-color: var(--lia-bs-body-color);--lia-bs-modal-content-bg: var(--lia-bs-white);--lia-bs-modal-backdrop-bg: var(--lia-bs-black);--lia-bs-modal-sm: 440px;--lia-bs-modal-md: 760px;--lia-bs-modal-lg: 1080px;--lia-bs-modal-backdrop-opacity: 0.3;--lia-bs-modal-content-box-shadow-xs: var(--lia-bs-box-shadow-sm);--lia-bs-modal-content-box-shadow-xs-up: var(--lia-bs-box-shadow);--lia-bs-modal-header-font-weight: 700;--lia-icon-size-10: 10px;--lia-icon-size-12: 12px;--lia-icon-size-14: 14px;--lia-icon-size-16: 16px;--lia-icon-size-20: 20px;--lia-icon-size-24: 24px;--lia-icon-size-30: 30px;--lia-icon-size-40: 40px;--lia-icon-size-50: 50px;--lia-icon-size-60: 60px;--lia-icon-size-80: 80px;--lia-icon-size-120: 120px;--lia-icon-size-160: 160px;--lia-bs-input-border-color: var(--lia-bs-gray-600);--lia-bs-input-disabled-color: var(--lia-bs-gray-600);--lia-bs-input-focus-border-color: var(--lia-bs-primary);--lia-bs-label-margin-bottom: 10px;--lia-bs-input-btn-font-size: var(--lia-bs-font-size-sm);--lia-bs-input-focus-box-shadow: 0 0 0 3px hsla(var(--lia-bs-primary-h), var(--lia-bs-primary-s), var(--lia-bs-primary-l), 0.2);--lia-check-label-margin-bottom: 2px;--lia-checkbox-border-radius: 3px;--lia-bs-input-border-radius-sm: var(--lia-bs-border-radius-sm);--lia-bs-input-border-radius: var(--lia-bs-border-radius);--lia-bs-input-border-radius-lg: var(--lia-bs-border-radius-lg);--lia-bs-form-text-margin-top: 4px;--lia-textarea-border-radius: var(--lia-bs-border-radius);--lia-input-active-fill-color: var(--lia-bs-primary);--lia-bs-popover-arrow-height: 8px;--lia-bs-popover-arrow-width: 16px;--lia-bs-popover-max-width: 300px;--lia-bs-popover-min-width: 100px;--lia-bs-popover-header-bg: var(--lia-bs-white);--lia-bs-popover-border-color: var(--lia-bs-border-color);--lia-bs-popover-border-radius: var(--lia-bs-border-radius);--lia-bs-popover-box-shadow: 0 0.5rem 1rem hsla(var(--lia-bs-black-h), var(--lia-bs-black-s), var(--lia-bs-black-l), 0.15);--lia-bs-dropdown-font-size: var(--lia-bs-font-size-sm);--lia-bs-dropdown-border-color: var(--lia-bs-border-color);--lia-bs-dropdown-border-radius: var(--lia-bs-border-radius-sm);--lia-bs-dropdown-divider-bg: var(--lia-bs-gray-300);--lia-bs-dropdown-item-padding-y: 5px;--lia-bs-dropdown-item-padding-x: 20px;--lia-bs-dropdown-header-color: var(--lia-bs-gray-700);--lia-bs-list-group-item-padding-y: 15px;--lia-bs-list-group-item-padding-x: 15px;--lia-bs-list-group-border-color: var(--lia-bs-gray-300);--lia-list-li-mb-sm: 5px;--lia-list-li-mb-md: 10px;--lia-list-li-mb-lg: 15px;--lia-list-li-mb-xl: 20px;--lia-list-li-mb-xxl: 25px;--lia-img-preview-content-bg-color: var(--lia-bs-gray-900);--lia-img-preview-title-color: var(--lia-bs-white);--lia-img-preview-control-color: var(--lia-bs-white);--lia-img-preview-control-bg-color: var(--lia-bs-gray-800);--lia-load-dot-dark-color: hsla(var(--lia-bs-black-h), var(--lia-bs-black-s), var(--lia-bs-black-l), 0.2);--lia-load-dot-light-color: hsla(var(--lia-bs-white-h), var(--lia-bs-white-s), var(--lia-bs-white-l), 0.5);--lia-load-bar-dark-color: hsla(var(--lia-bs-black-h), var(--lia-bs-black-s), var(--lia-bs-black-l), 0.06);--lia-load-bar-light-color: hsla(var(--lia-bs-white-h), var(--lia-bs-white-s), var(--lia-bs-white-l), 0.4);--lia-load-text-color: var(--lia-bs-link-color);--lia-load-text-font-weight: var(--lia-font-weight-md);--lia-load-text-font-size: var(--lia-bs-font-size-sm);--lia-divider-size: 3px;--lia-divider-ml: 4px;--lia-divider-mr: 4px;--lia-divider-border-radius: 50%;--lia-divider-bg-color: var(--lia-bs-gray-600);--lia-divider-bg-color-active: var(--lia-bs-gray-600);--lia-chip-max-width: 300px;--lia-chip-height: 30px;--lia-yiq-light-h: 0;--lia-yiq-light-s: 0%;--lia-yiq-light-l: 100%;--lia-yiq-light: hsl(var(--lia-yiq-light-h), var(--lia-yiq-light-s), var(--lia-yiq-light-l));--lia-yiq-dark-h: 0;--lia-yiq-dark-s: 0%;--lia-yiq-dark-l: 0%;--lia-yiq-dark: hsl(var(--lia-yiq-dark-h), var(--lia-yiq-dark-s), var(--lia-yiq-dark-l));--lia-rte-bg-color: var(--lia-bs-white);--lia-rte-border-radius: var(--lia-panel-border-radius);--lia-rte-box-shadow: var(--lia-panel-box-shadow);--lia-rte-custom-color-1: #bfedd2;--lia-rte-custom-color-2: #fbeeb8;--lia-rte-custom-color-3: #f8cac6;--lia-rte-custom-color-4: #eccafa;--lia-rte-custom-color-5: #c2e0f4;--lia-rte-custom-color-6: #2dc26b;--lia-rte-custom-color-7: #f1c40f;--lia-rte-custom-color-8: #e03e2d;--lia-rte-custom-color-9: #b96ad9;--lia-rte-custom-color-10: #3598db;--lia-rte-custom-color-11: #169179;--lia-rte-custom-color-12: #e67e23;--lia-rte-custom-color-13: #ba372a;--lia-rte-custom-color-14: #843fa1;--lia-rte-custom-color-15: #236fa1;--lia-rte-custom-color-16: #ecf0f1;--lia-rte-custom-color-17: #ced4d9;--lia-rte-custom-color-18: #95a5a6;--lia-rte-custom-color-19: #7e8c8d;--lia-rte-custom-color-20: #34495e;--lia-rte-custom-color-21: #000000;--lia-rte-custom-color-22: #ffffff;--lia-rte-default-message-header-mt: 14px;--lia-rte-default-message-header-mb: 10px;--lia-rte-default-message-item-mt: 0;--lia-rte-default-message-item-mb: 10px;--lia-rte-diff-added-color: hsla(170, 53%, 51%, 0.4);--lia-rte-diff-removed-color: hsla(9, 74%, 47%, 0.4);--lia-rte-diff-none-color: hsla(0, 0%, 80%, 0.4);--lia-rte-diff-changed-color: hsla(43, 97%, 63%, 0.4);--lia-rte-special-message-header-mt: 14px;--lia-rte-special-message-header-mb: 10px;--lia-rte-special-message-item-mt: 0;--lia-rte-special-message-item-mb: 10px;--lia-prism-color: #000000;--lia-prism-bg-color: #f5f2f0;--lia-prism-font-family: var(--font-family-monospace);--lia-prism-font-size: var(--lia-bs-font-size-base);--lia-prism-font-weight-bold: var(--lia-bs-font-weight-bold);--lia-prism-font-style-italic: italic;--lia-prism-tab-size: 2;--lia-prism-highlight-color: #b3d4fc;--lia-prism-comment-color: #62707e;--lia-prism-punctuation-color: #6f6f6f;--lia-prism-namespace-opacity: 0.7;--lia-prism-prop-color: #990055;--lia-prism-selector-color: #517a00;--lia-prism-operator-color: #906736;--lia-prism-operator-bg-color: hsla(0, 0%, 100%, 0.5);--lia-prism-keyword-color: #0076a9;--lia-prism-function-color: #d3284b;--lia-prism-variable-color: #c14700;--lia-tag-bg-color: var(--lia-bs-gray-200);--lia-tag-bg-hover-color: var(--lia-bs-gray-400);--lia-tag-border-radius: var(--lia-bs-border-radius-sm);--lia-tag-color: var(--lia-bs-body-color);--lia-tag-hover-color: var(--lia-bs-body-color);--lia-tag-font-weight: var(--lia-font-weight-md);--lia-tag-font-size: var(--lia-font-size-xxs);--lia-tag-text-transform: uppercase;--lia-tag-letter-spacing: 0.5px;--lia-bs-toast-border-radius: var(--lia-bs-border-radius);--lia-bs-toast-padding-x: 12px;--lia-emoji-skin-tone-default: #ffcd43;--lia-emoji-skin-tone-light: #fae3c5;--lia-emoji-skin-tone-medium-light: #e2cfa5;--lia-emoji-skin-tone-medium: #daa478;--lia-emoji-skin-tone-medium-dark: #a78058;--lia-emoji-skin-tone-dark: #5e4d43;--lia-email-link-color: #0069D4;--lia-email-link-hover-color: #0061c2;--lia-email-link-decoration: none;--lia-email-link-hover-decoration: underline;--lia-email-border-color: #e4e4e4;--lia-email-btn-border-radius-lg: 5px;--lia-email-btn-padding-x-lg: 16px;--lia-email-btn-padding-y-lg: 7px;--lia-email-btn-font-weight: 700;--lia-email-btn-primary-text-color: #ffffff;--lia-email-btn-primary-text-hover-color: #ffffff;--lia-email-btn-primary-bg-color: #0069D4;--lia-email-btn-primary-bg-hover-color: #005cb8;--lia-email-btn-primary-border: 1px solid transparent;--lia-email-btn-primary-border-hover: 1px solid transparent;--lia-email-panel-border-color: #e4e4e4;--lia-email-panel-border-radius: 5px;--lia-checkmark-input-icon: url(/static/graphics/processed/w78VdNAhVv9lCpAB5qCxSL66EsM/checkmark-input.svg#checkmark-input);--lia-chevron-down-icon: url(/static/graphics/processed/w78VdNAhVv9lCpAB5qCxSL66EsM/chevron-down.svg#chevron-down);--lia-close-icon: url(/static/graphics/processed/w78VdNAhVv9lCpAB5qCxSL66EsM/close.svg#close);--lia-edit-icon: url(/static/graphics/processed/w78VdNAhVv9lCpAB5qCxSL66EsM/edit.svg#edit);--lia-select-arrow-icon: url(/static/graphics/processed/w78VdNAhVv9lCpAB5qCxSL66EsM/select-arrow.svg#select-arrow);--lia-video-play-active-icon: url(/static/graphics/processed/w78VdNAhVv9lCpAB5qCxSL66EsM/video-play-active.svg#video-play-active);--lia-video-play-disabled-icon: url(/static/graphics/processed/w78VdNAhVv9lCpAB5qCxSL66EsM/video-play-disabled.svg#video-play-disabled);--lia-user-icon: url(/static/graphics/processed/w78VdNAhVv9lCpAB5qCxSL66EsM/user.svg#user);--lia-user-mention-icon: url(/static/graphics/processed/w78VdNAhVv9lCpAB5qCxSL66EsM/mention.svg#mention);--lia-content-blog-icon: url(/static/graphics/processed/w78VdNAhVv9lCpAB5qCxSL66EsM/content-blog.svg#content-blog);--lia-content-knowledge-icon: url(/static/graphics/processed/w78VdNAhVv9lCpAB5qCxSL66EsM/content-knowledge.svg#content-knowledge);--lia-content-category-icon: url(/static/graphics/processed/w78VdNAhVv9lCpAB5qCxSL66EsM/content-category.svg#content-category);--lia-content-contest-icon: url(/static/graphics/processed/w78VdNAhVv9lCpAB5qCxSL66EsM/content-contest.svg#content-contest);--lia-content-discussion-icon: url(/static/graphics/processed/w78VdNAhVv9lCpAB5qCxSL66EsM/content-discussion.svg#content-discussion);--lia-content-discussion-question-icon: url(/static/graphics/processed/w78VdNAhVv9lCpAB5qCxSL66EsM/content-discussion-question.svg#content-discussion-question);--lia-content-occasion-icon: url(/static/graphics/processed/w78VdNAhVv9lCpAB5qCxSL66EsM/content-occasion.svg#content-occasion);--lia-content-group-icon: url(/static/graphics/processed/w78VdNAhVv9lCpAB5qCxSL66EsM/content-group.svg#content-group);--lia-content-idea-icon: url(/static/graphics/processed/w78VdNAhVv9lCpAB5qCxSL66EsM/content-idea.svg#content-idea);--lia-external-link-icon: url(/static/graphics/processed/w78VdNAhVv9lCpAB5qCxSL66EsM/external-link.svg#external-link);--lia-anchor-icon: url(/static/graphics/processed/w78VdNAhVv9lCpAB5qCxSL66EsM/anchor.svg#anchor);--lia-primary-dark-h: var(--lia-bs-primary-h);--lia-primary-dark-s: var(--lia-bs-primary-s);--lia-primary-dark-l: 36%;--lia-primary-dark: hsl(var(--lia-primary-dark-h), var(--lia-primary-dark-s), var(--lia-primary-dark-l));--lia-primary-light-h: var(--lia-bs-primary-h);--lia-primary-light-s: var(--lia-bs-primary-s);--lia-primary-light-l: 74%;--lia-primary-light: hsl(var(--lia-primary-light-h), var(--lia-primary-light-s), var(--lia-primary-light-l));--lia-primary-lighter-h: var(--lia-bs-primary-h);--lia-primary-lighter-s: var(--lia-bs-primary-s);--lia-primary-lighter-l: 89%;--lia-primary-lighter: hsl(var(--lia-primary-lighter-h), var(--lia-primary-lighter-s), var(--lia-primary-lighter-l));--lia-primary-lightest-h: var(--lia-bs-primary-h);--lia-primary-lightest-s: var(--lia-bs-primary-s);--lia-primary-lightest-l: 95%;--lia-primary-lightest: hsl(var(--lia-primary-lightest-h), var(--lia-primary-lightest-s), var(--lia-primary-lightest-l));--lia-info-dark-h: var(--lia-bs-info-h);--lia-info-dark-s: var(--lia-bs-info-s);--lia-info-dark-l: 39%;--lia-info-dark: hsl(var(--lia-info-dark-h), var(--lia-info-dark-s), var(--lia-info-dark-l));--lia-info-light-h: var(--lia-bs-info-h);--lia-info-light-s: var(--lia-bs-info-s);--lia-info-light-l: 72%;--lia-info-light: hsl(var(--lia-info-light-h), var(--lia-info-light-s), var(--lia-info-light-l));--lia-info-lighter-h: var(--lia-bs-info-h);--lia-info-lighter-s: var(--lia-bs-info-s);--lia-info-lighter-l: 85%;--lia-info-lighter: hsl(var(--lia-info-lighter-h), var(--lia-info-lighter-s), var(--lia-info-lighter-l));--lia-info-lightest-h: var(--lia-bs-info-h);--lia-info-lightest-s: var(--lia-bs-info-s);--lia-info-lightest-l: 93%;--lia-info-lightest: hsl(var(--lia-info-lightest-h), var(--lia-info-lightest-s), var(--lia-info-lightest-l));--lia-success-dark-h: var(--lia-bs-success-h);--lia-success-dark-s: var(--lia-bs-success-s);--lia-success-dark-l: 24%;--lia-success-dark: hsl(var(--lia-success-dark-h), var(--lia-success-dark-s), var(--lia-success-dark-l));--lia-success-light-h: var(--lia-bs-success-h);--lia-success-light-s: var(--lia-bs-success-s);--lia-success-light-l: 62%;--lia-success-light: hsl(var(--lia-success-light-h), var(--lia-success-light-s), var(--lia-success-light-l));--lia-success-lighter-h: var(--lia-bs-success-h);--lia-success-lighter-s: var(--lia-bs-success-s);--lia-success-lighter-l: 80%;--lia-success-lighter: hsl(var(--lia-success-lighter-h), var(--lia-success-lighter-s), var(--lia-success-lighter-l));--lia-success-lightest-h: var(--lia-bs-success-h);--lia-success-lightest-s: var(--lia-bs-success-s);--lia-success-lightest-l: 91%;--lia-success-lightest: hsl(var(--lia-success-lightest-h), var(--lia-success-lightest-s), var(--lia-success-lightest-l));--lia-warning-dark-h: var(--lia-bs-warning-h);--lia-warning-dark-s: var(--lia-bs-warning-s);--lia-warning-dark-l: 39%;--lia-warning-dark: hsl(var(--lia-warning-dark-h), var(--lia-warning-dark-s), var(--lia-warning-dark-l));--lia-warning-light-h: var(--lia-bs-warning-h);--lia-warning-light-s: var(--lia-bs-warning-s);--lia-warning-light-l: 68%;--lia-warning-light: hsl(var(--lia-warning-light-h), var(--lia-warning-light-s), var(--lia-warning-light-l));--lia-warning-lighter-h: var(--lia-bs-warning-h);--lia-warning-lighter-s: var(--lia-bs-warning-s);--lia-warning-lighter-l: 84%;--lia-warning-lighter: hsl(var(--lia-warning-lighter-h), var(--lia-warning-lighter-s), var(--lia-warning-lighter-l));--lia-warning-lightest-h: var(--lia-bs-warning-h);--lia-warning-lightest-s: var(--lia-bs-warning-s);--lia-warning-lightest-l: 93%;--lia-warning-lightest: hsl(var(--lia-warning-lightest-h), var(--lia-warning-lightest-s), var(--lia-warning-lightest-l));--lia-danger-dark-h: var(--lia-bs-danger-h);--lia-danger-dark-s: var(--lia-bs-danger-s);--lia-danger-dark-l: 41%;--lia-danger-dark: hsl(var(--lia-danger-dark-h), var(--lia-danger-dark-s), var(--lia-danger-dark-l));--lia-danger-light-h: var(--lia-bs-danger-h);--lia-danger-light-s: var(--lia-bs-danger-s);--lia-danger-light-l: 72%;--lia-danger-light: hsl(var(--lia-danger-light-h), var(--lia-danger-light-s), var(--lia-danger-light-l));--lia-danger-lighter-h: var(--lia-bs-danger-h);--lia-danger-lighter-s: var(--lia-bs-danger-s);--lia-danger-lighter-l: 89%;--lia-danger-lighter: hsl(var(--lia-danger-lighter-h), var(--lia-danger-lighter-s), var(--lia-danger-lighter-l));--lia-danger-lightest-h: var(--lia-bs-danger-h);--lia-danger-lightest-s: var(--lia-bs-danger-s);--lia-danger-lightest-l: 95%;--lia-danger-lightest: hsl(var(--lia-danger-lightest-h), var(--lia-danger-lightest-s), var(--lia-danger-lightest-l)); }</style><title>Tag:&quot;security&quot; | DevCentral</title><meta name="robots" content="index,follow"/><meta name="twitter:card" content="summary"/><meta property="og:title" content="Tag:&quot;security&quot; | DevCentral"/><meta property="og:url" content="https://community.f5.com/tag/security"/><meta property="og:type" content="website"/><meta property="og:image" content="https://community.f5.com/t5/s/zihoc95639/m_assets/themes/customTheme1/f5_logo_fix-1704824537976.svg?time=1704824540697"/><meta property="og:site_name" content="DevCentral - an F5 Community"/><link rel="canonical" href="https://community.f5.com/tag/security"/><style type="text/css">:root:root { --lia-nav-bg-color: var(--lia-bs-white); --lia-nav-bg-opacity: 0.4; --lia-nav-pt: 10px; --lia-nav-pb: 10px; --lia-nav-border-bottom: 0; --lia-nav-box-shadow: var(--lia-bs-box-shadow-sm); --lia-nav-brand-mr: 30px; --lia-nav-brand-mr-sm: 10px; --lia-nav-brand-logo-height: 48px; --lia-nav-link-gap: 10px; --lia-nav-link-justify-content: center; --lia-nav-link-py: 5px; --lia-nav-link-px: 10px; --lia-nav-link-dropdown-py: 9px; --lia-nav-link-dropdown-px: var(--lia-nav-link-px); --lia-nav-link-color: var(--lia-bs-primary); --lia-nav-link-hover-color: var(--lia-bs-primary); --lia-nav-link-font-size: 15px; --lia-nav-link-font-style: NORMAL; --lia-nav-link-font-weight: 700; --lia-nav-link-text-transform: none; --lia-nav-link-letter-spacing: normal; --lia-nav-link-border-radius: var(--lia-bs-border-radius-sm); --lia-nav-link-bg-color: transparent; --lia-nav-link-bg-hover-color: transparent; --lia-nav-link-border: none; --lia-nav-link-border-hover: none; --lia-nav-link-box-shadow: none; --lia-nav-link-box-shadow-hover: none; --lia-nav-link-text-border-bottom: none; --lia-nav-link-text-border-bottom-hover: 2px solid #0C5C8D; --lia-nav-dropdown-pt: 10px; --lia-nav-dropdown-pb: 15px; --lia-nav-dropdown-px: 10px; --lia-nav-dropdown-menu-offset: 2px; --lia-nav-dropdown-divider-mt: 10px; --lia-nav-dropdown-divider-mb: 10px; --lia-nav-dropdown-border-color: hsla(var(--lia-bs-black-h), var(--lia-bs-black-s), var(--lia-bs-black-l), 0.08); --lia-nav-controller-bg-hover-color: hsla(var(--lia-bs-black-h), var(--lia-bs-black-s), var(--lia-bs-black-l), 0.1); --lia-nav-controller-icon-color: #0C5C8D; --lia-nav-controller-icon-hover-color: #0C5C8D; --lia-nav-controller-icon-highlight: hsla(30, 100%, 50%); --lia-nav-controller-icon-highlight-text: var(--lia-yiq-dark); --lia-nav-controller-text-color: var(--lia-nav-controller-icon-color); --lia-nav-controller-text-hover-color: var(--lia-nav-controller-icon-hover-color); --lia-nav-controller-border-radius: var(--lia-border-radius-50); --lia-nav-hamburger-color: var(--lia-nav-controller-icon-color); --lia-nav-hamburger-hover-color: var(--lia-nav-controller-icon-color); --lia-nav-hamburger-bg-color: transparent; --lia-nav-hamburger-bg-hover-color: transparent; --lia-nav-hamburger-border: none; --lia-nav-hamburger-border-hover: none; --lia-nav-collapse-menu-ml: 20px; --lia-nav-collapse-menu-divider-bg: var(--lia-nav-link-color); --lia-nav-collapse-menu-divider-opacity: 0.16; }</style><meta name="next-head-count" content="17"/><noscript id="__next_css__DO_NOT_USE__"></noscript><script id="prism-bootstrap" data-nscript="beforeInteractive" crossorigin="anonymous">window.Prism = window.Prism || {};Prism.manual = true;</script><link rel="preload" href="/_next/static/css/56c88ed5dc05519a.css" as="style" crossorigin="anonymous"/><link rel="stylesheet" href="/_next/static/css/56c88ed5dc05519a.css" crossorigin="anonymous" data-n-g=""/><link rel="preload" href="/_next/static/css/5618e531214e48a2.css" as="style" crossorigin="anonymous"/><link rel="stylesheet" href="/_next/static/css/5618e531214e48a2.css" crossorigin="anonymous" data-n-p=""/><link rel="preload" href="/_next/static/css/75c3051a6282c4c8.css" as="style" crossorigin="anonymous"/><link rel="stylesheet" href="/_next/static/css/75c3051a6282c4c8.css" crossorigin="anonymous"/><link rel="preload" href="/_next/static/css/7e9b6cf1e4096094.css" as="style" crossorigin="anonymous"/><link rel="stylesheet" href="/_next/static/css/7e9b6cf1e4096094.css" crossorigin="anonymous"/><link rel="preload" href="/_next/static/css/27354a62d6df58b7.css" as="style" crossorigin="anonymous"/><link rel="stylesheet" href="/_next/static/css/27354a62d6df58b7.css" crossorigin="anonymous"/><link rel="preload" href="/_next/static/css/6b6feb98a73e4b36.css" as="style" crossorigin="anonymous"/><link rel="stylesheet" href="/_next/static/css/6b6feb98a73e4b36.css" crossorigin="anonymous"/><link rel="preload" href="/_next/static/css/b3570409e4961851.css" as="style" crossorigin="anonymous"/><link rel="stylesheet" href="/_next/static/css/b3570409e4961851.css" crossorigin="anonymous"/><link rel="preload" href="/_next/static/css/862b9c0d1ee38b75.css" as="style" crossorigin="anonymous"/><link rel="stylesheet" href="/_next/static/css/862b9c0d1ee38b75.css" crossorigin="anonymous"/><link rel="preload" href="/_next/static/css/96e83c4412cdcd6d.css" as="style" crossorigin="anonymous"/><link rel="stylesheet" href="/_next/static/css/96e83c4412cdcd6d.css" crossorigin="anonymous"/><link rel="preload" href="/_next/static/css/0aea06143d4d2261.css" as="style" crossorigin="anonymous"/><link rel="stylesheet" href="/_next/static/css/0aea06143d4d2261.css" crossorigin="anonymous"/><link rel="preload" href="/_next/static/css/a87e85723550ff6c.css" as="style" crossorigin="anonymous"/><link rel="stylesheet" href="/_next/static/css/a87e85723550ff6c.css" crossorigin="anonymous"/><link rel="preload" href="/_next/static/css/2aa3720515fb0a77.css" as="style" crossorigin="anonymous"/><link rel="stylesheet" href="/_next/static/css/2aa3720515fb0a77.css" crossorigin="anonymous"/><link rel="preload" href="/_next/static/css/2cb7930a61479b70.css" as="style" crossorigin="anonymous"/><link rel="stylesheet" href="/_next/static/css/2cb7930a61479b70.css" crossorigin="anonymous"/><link rel="preload" href="/_next/static/css/0da1a563af23ca7c.css" as="style" crossorigin="anonymous"/><link rel="stylesheet" href="/_next/static/css/0da1a563af23ca7c.css" crossorigin="anonymous"/><link rel="preload" href="/_next/static/css/42e9764eeeee6494.css" as="style" crossorigin="anonymous"/><link rel="stylesheet" href="/_next/static/css/42e9764eeeee6494.css" crossorigin="anonymous"/><link rel="preload" href="/_next/static/css/1c3f585139da29cd.css" as="style" crossorigin="anonymous"/><link rel="stylesheet" href="/_next/static/css/1c3f585139da29cd.css" crossorigin="anonymous"/><link rel="preload" href="/_next/static/css/7095b0671a530308.css" as="style" crossorigin="anonymous"/><link rel="stylesheet" href="/_next/static/css/7095b0671a530308.css" crossorigin="anonymous"/><link rel="preload" href="/_next/static/css/2816a50928585b4e.css" as="style" crossorigin="anonymous"/><link rel="stylesheet" href="/_next/static/css/2816a50928585b4e.css" crossorigin="anonymous"/><link rel="preload" href="/_next/static/css/6d34664495fc4324.css" as="style" crossorigin="anonymous"/><link rel="stylesheet" href="/_next/static/css/6d34664495fc4324.css" crossorigin="anonymous"/><link rel="preload" href="/_next/static/css/aaf10f0ba0cbc63d.css" as="style" crossorigin="anonymous"/><link rel="stylesheet" href="/_next/static/css/aaf10f0ba0cbc63d.css" crossorigin="anonymous"/><link rel="preload" href="/_next/static/css/409df01db028e852.css" as="style" crossorigin="anonymous"/><link rel="stylesheet" href="/_next/static/css/409df01db028e852.css" crossorigin="anonymous"/><link rel="preload" href="/_next/static/css/d4264eb30d961446.css" as="style" crossorigin="anonymous"/><link rel="stylesheet" href="/_next/static/css/d4264eb30d961446.css" crossorigin="anonymous"/><link rel="preload" href="/_next/static/css/75ad7c095c67e244.css" as="style" crossorigin="anonymous"/><link rel="stylesheet" href="/_next/static/css/75ad7c095c67e244.css" crossorigin="anonymous"/><link rel="preload" href="/_next/static/css/301c38302d8be06d.css" as="style" crossorigin="anonymous"/><link rel="stylesheet" href="/_next/static/css/301c38302d8be06d.css" crossorigin="anonymous"/><link rel="preload" href="/_next/static/css/c937327d1540684c.css" as="style" crossorigin="anonymous"/><link rel="stylesheet" href="/_next/static/css/c937327d1540684c.css" crossorigin="anonymous"/><link rel="preload" href="/_next/static/css/898a37b39d750ea3.css" as="style" crossorigin="anonymous"/><link rel="stylesheet" href="/_next/static/css/898a37b39d750ea3.css" crossorigin="anonymous"/><link rel="preload" href="/_next/static/css/df44b1c199b8d509.css" as="style" crossorigin="anonymous"/><link rel="stylesheet" href="/_next/static/css/df44b1c199b8d509.css" crossorigin="anonymous"/><link rel="preload" href="/_next/static/css/23c96cb7cbd5ad7f.css" as="style" crossorigin="anonymous"/><link rel="stylesheet" href="/_next/static/css/23c96cb7cbd5ad7f.css" crossorigin="anonymous"/><link rel="preload" href="/_next/static/css/8cc8a18b0063d113.css" as="style" crossorigin="anonymous"/><link rel="stylesheet" href="/_next/static/css/8cc8a18b0063d113.css" crossorigin="anonymous"/><link rel="preload" href="/_next/static/css/b9935098f62e7008.css" as="style" crossorigin="anonymous"/><link rel="stylesheet" href="/_next/static/css/b9935098f62e7008.css" crossorigin="anonymous"/><link rel="preload" href="/_next/static/css/59b8b7f2623bdd51.css" as="style" crossorigin="anonymous"/><link rel="stylesheet" href="/_next/static/css/59b8b7f2623bdd51.css" crossorigin="anonymous"/><link rel="preload" href="/_next/static/css/3a863b8498fa8e1d.css" as="style" crossorigin="anonymous"/><link rel="stylesheet" href="/_next/static/css/3a863b8498fa8e1d.css" crossorigin="anonymous"/><link rel="preload" href="/_next/static/css/db0340f212ade6ad.css" as="style" crossorigin="anonymous"/><link rel="stylesheet" href="/_next/static/css/db0340f212ade6ad.css" crossorigin="anonymous"/><link rel="preload" href="/_next/static/css/98b5ac728637f1cb.css" as="style" crossorigin="anonymous"/><link rel="stylesheet" href="/_next/static/css/98b5ac728637f1cb.css" crossorigin="anonymous"/><link rel="preload" href="/_next/static/css/05b093ae0eb6b71f.css" as="style" crossorigin="anonymous"/><link rel="stylesheet" href="/_next/static/css/05b093ae0eb6b71f.css" crossorigin="anonymous"/><link rel="preload" href="/_next/static/css/b7d92dc4845e6703.css" as="style" crossorigin="anonymous"/><link rel="stylesheet" href="/_next/static/css/b7d92dc4845e6703.css" crossorigin="anonymous"/><link rel="preload" href="/_next/static/css/513506ccc4ed2185.css" as="style" crossorigin="anonymous"/><link rel="stylesheet" href="/_next/static/css/513506ccc4ed2185.css" crossorigin="anonymous"/><link rel="preload" href="/_next/static/css/131c09f7f9cfb5ca.css" as="style" crossorigin="anonymous"/><link rel="stylesheet" href="/_next/static/css/131c09f7f9cfb5ca.css" crossorigin="anonymous"/><link rel="preload" href="/_next/static/css/57ae4de6d029d43c.css" as="style" crossorigin="anonymous"/><link rel="stylesheet" href="/_next/static/css/57ae4de6d029d43c.css" crossorigin="anonymous"/><link rel="preload" href="/_next/static/css/85ce318396249779.css" as="style" crossorigin="anonymous"/><link rel="stylesheet" href="/_next/static/css/85ce318396249779.css" crossorigin="anonymous"/><link rel="preload" href="/_next/static/css/abdf327dd8cf79f1.css" as="style" crossorigin="anonymous"/><link rel="stylesheet" href="/_next/static/css/abdf327dd8cf79f1.css" crossorigin="anonymous"/><link rel="preload" href="/_next/static/css/64cbdedd0f772bf9.css" as="style" crossorigin="anonymous"/><link rel="stylesheet" href="/_next/static/css/64cbdedd0f772bf9.css" crossorigin="anonymous"/><link rel="preload" href="/_next/static/css/fab4ae2c426f1310.css" as="style" crossorigin="anonymous"/><link rel="stylesheet" href="/_next/static/css/fab4ae2c426f1310.css" crossorigin="anonymous"/><link rel="preload" href="/_next/static/css/ef0aa89b8bf7ac61.css" as="style" crossorigin="anonymous"/><link rel="stylesheet" href="/_next/static/css/ef0aa89b8bf7ac61.css" crossorigin="anonymous"/><link rel="preload" href="/_next/static/css/480cc2e13aa30747.css" as="style" crossorigin="anonymous"/><link rel="stylesheet" href="/_next/static/css/480cc2e13aa30747.css" crossorigin="anonymous"/><link rel="preload" href="/_next/static/css/01bbadcc1be827c5.css" as="style" crossorigin="anonymous"/><link rel="stylesheet" href="/_next/static/css/01bbadcc1be827c5.css" crossorigin="anonymous"/><link rel="preload" href="/_next/static/css/1f6561d6eee9579a.css" as="style" crossorigin="anonymous"/><link rel="stylesheet" href="/_next/static/css/1f6561d6eee9579a.css" crossorigin="anonymous"/><noscript data-n-css=""></noscript><script defer="" crossorigin="anonymous" nomodule="" src="/_next/static/chunks/polyfills-42372ed130431b0a.js"></script><script defer="" src="/_next/static/chunks/23132.aba50be66ed46ddd.js" crossorigin="anonymous"></script><script defer="" src="/_next/static/chunks/85582.32690df8fb7a438d.js" crossorigin="anonymous"></script><script defer="" src="/_next/static/chunks/2873-0f84d3a9b4d0e96c.js" crossorigin="anonymous"></script><script defer="" src="/_next/static/chunks/43158.a01910989d725a17.js" crossorigin="anonymous"></script><script defer="" src="/_next/static/chunks/40423.6e764a1e65bf4776.js" crossorigin="anonymous"></script><script defer="" src="/_next/static/chunks/23842-50a5f5cd0263b835.js" crossorigin="anonymous"></script><script defer="" src="/_next/static/chunks/37330-b74927bfa7df1422.js" crossorigin="anonymous"></script><script defer="" src="/_next/static/chunks/76820-4cbca61cfa21d419.js" crossorigin="anonymous"></script><script defer="" src="/_next/static/chunks/56930-1627650c08aeb7ae.js" crossorigin="anonymous"></script><script defer="" src="/_next/static/chunks/97524-b00a3792c5b68344.js" crossorigin="anonymous"></script><script defer="" src="/_next/static/chunks/77463-2acfddc67ff4590a.js" crossorigin="anonymous"></script><script defer="" src="/_next/static/chunks/84770-365f3ee12e2fce2c.js" crossorigin="anonymous"></script><script defer="" src="/_next/static/chunks/97333-db262cde252fccfe.js" crossorigin="anonymous"></script><script defer="" src="/_next/static/chunks/34062-4b85177bdcba5693.js" crossorigin="anonymous"></script><script defer="" src="/_next/static/chunks/7207.2a918597ad716115.js" crossorigin="anonymous"></script><script defer="" src="/_next/static/chunks/83729-1dfac046ba3f620a.js" crossorigin="anonymous"></script><script defer="" src="/_next/static/chunks/43847-41c9fc7e171ffb6b.js" crossorigin="anonymous"></script><script defer="" src="/_next/static/chunks/17603-dbe47c5878fc378c.js" crossorigin="anonymous"></script><script defer="" src="/_next/static/chunks/83256.e7a0d858a15a3f19.js" crossorigin="anonymous"></script><script defer="" src="/_next/static/chunks/30590.e2f84ee11db07f51.js" crossorigin="anonymous"></script><script defer="" src="/_next/static/chunks/86460.ba3f744c64cbd793.js" crossorigin="anonymous"></script><script defer="" src="/_next/static/chunks/3586.226851a5412d3cd5.js" crossorigin="anonymous"></script><script defer="" src="/_next/static/chunks/18825.00b85515a76c908e.js" crossorigin="anonymous"></script><script defer="" src="/_next/static/chunks/80688.a8a2cc5a0dff3786.js" crossorigin="anonymous"></script><script defer="" src="/_next/static/chunks/30533.24974af6b224c724.js" crossorigin="anonymous"></script><script defer="" src="/_next/static/chunks/31304.aab19f4c2a6bd3ec.js" crossorigin="anonymous"></script><script defer="" src="/_next/static/chunks/91923.fdb909658f0c2acc.js" crossorigin="anonymous"></script><script defer="" src="/_next/static/chunks/11374.680ee5c3cc71a22a.js" crossorigin="anonymous"></script><script defer="" src="/_next/static/chunks/21001.426453342ebb007f.js" crossorigin="anonymous"></script><script defer="" src="/_next/static/chunks/37852.fa12895224939548.js" crossorigin="anonymous"></script><script defer="" src="/_next/static/chunks/1749.fbb36e01dd5ccf25.js" crossorigin="anonymous"></script><script defer="" src="/_next/static/chunks/47130.929b11adf95de1b3.js" crossorigin="anonymous"></script><script defer="" src="/_next/static/chunks/74672.6c3c6763f41297f1.js" crossorigin="anonymous"></script><script defer="" src="/_next/static/chunks/70389.1eaa172f1a126018.js" crossorigin="anonymous"></script><script defer="" src="/_next/static/chunks/60191.a60433c686292849.js" crossorigin="anonymous"></script><script defer="" src="/_next/static/chunks/82973.a8573f289594512e.js" crossorigin="anonymous"></script><script defer="" src="/_next/static/chunks/54341-24533ca1f8593f2a.js" crossorigin="anonymous"></script><script defer="" src="/_next/static/chunks/4398-6d4713519649882b.js" crossorigin="anonymous"></script><script defer="" src="/_next/static/chunks/72676-c350a5067eb683a6.js" crossorigin="anonymous"></script><script defer="" src="/_next/static/chunks/14710-eb5c9983f1cbc852.js" crossorigin="anonymous"></script><script defer="" src="/_next/static/chunks/23446-ff40e151cbd5f68b.js" crossorigin="anonymous"></script><script defer="" src="/_next/static/chunks/39667-789603eda821d3f8.js" crossorigin="anonymous"></script><script defer="" src="/_next/static/chunks/74783-54dd9820d2d470bb.js" crossorigin="anonymous"></script><script defer="" src="/_next/static/chunks/32876-776eacb5b00b48ed.js" crossorigin="anonymous"></script><script defer="" src="/_next/static/chunks/74424.d4e30d46a2bce465.js" crossorigin="anonymous"></script><script defer="" src="/_next/static/chunks/69672.4fcfb7067783ad85.js" crossorigin="anonymous"></script><script defer="" src="/_next/static/chunks/35597.7b219d9b96d7ea55.js" crossorigin="anonymous"></script><script defer="" src="/_next/static/chunks/788.5e7afa7bb80e88eb.js" crossorigin="anonymous"></script><script defer="" src="/_next/static/chunks/97078.18cb9d838320d67b.js" crossorigin="anonymous"></script><script defer="" src="/_next/static/chunks/18544.9bfc5377bc7f3b0d.js" crossorigin="anonymous"></script><script defer="" src="/_next/static/chunks/91180.8e11bd6ca0fe0d08.js" crossorigin="anonymous"></script><script src="/_next/static/chunks/webpack-359c7eff5f2c4f58.js" defer="" crossorigin="anonymous"></script><script src="/_next/static/chunks/main-5fe5cbe4f3280849.js" defer="" crossorigin="anonymous"></script><script src="/_next/static/chunks/pages/_app-0ee9087b9bfcd6f6.js" defer="" crossorigin="anonymous"></script><script src="/_next/static/chunks/56954-a661bff96978ced0.js" defer="" crossorigin="anonymous"></script><script src="/_next/static/chunks/37553-349b571b1837d9f5.js" defer="" crossorigin="anonymous"></script><script src="/_next/static/chunks/67527-2f9f9c5d94b90716.js" defer="" crossorigin="anonymous"></script><script src="/_next/static/chunks/85258-f865e4a42ddc0a36.js" defer="" crossorigin="anonymous"></script><script src="/_next/static/chunks/51325-f799cb915ede1d5f.js" defer="" crossorigin="anonymous"></script><script src="/_next/static/chunks/42098-920e422fc5ade12c.js" defer="" crossorigin="anonymous"></script><script src="/_next/static/chunks/92236-a3c47c22843a7ce2.js" defer="" crossorigin="anonymous"></script><script src="/_next/static/chunks/pages/tags/TagPage/TagPage-8d2571427e9d036f.js" defer="" crossorigin="anonymous"></script><script src="/_next/static/UtG3-Pbti3STtL2t_tPEH/_buildManifest.js" defer="" crossorigin="anonymous"></script><script src="/_next/static/UtG3-Pbti3STtL2t_tPEH/_ssgManifest.js" defer="" crossorigin="anonymous"></script></head><body><div id="__next"><header data-testid="QuiltWrapperSection" style="background:url(https://community.f5.com/t5/s/zihoc95639/m_assets/quiltwrappers/Common/header.jpg?time=1702932449000) left center / cover no-repeat"><div class="CustomComponent_lia-wrapper__7IqeO" style="--lia-local-bg-color:transparent"><article class="CustomComponent_lia-article__sQ7z4" data-testid="CustomComponent"><section><style> .metaNav { align-items: center; background: #ffffff; display: flex; justify-content: space-between; position: relative; padding: 10px 30px; width: 100%; z-index: 1021; } .metaNavCta{ align-items: center; cursor: pointer; display: flex; justify-content: center; padding: 5px; } .metaNavCta a { color: #333 !important; text-decoration: none; font-size: 1rem; } .metaNavCta a:hover { text-decoration: underline !important; } .metaNavCta svg { margin-left: 3px; fill: #333; height: 15px; } .metaNavList { background: #f1f1f1; position: absolute; padding: 10px 15px; top: 30px; width: 250px; z-index: 4; } #metaFirstList { left: 0; } #metaSecondList { right: 0; } .metaNavList li { color: #666; cursor: pointer; font-weight: normal; font-size: 14px; list-style: none; line-height: 35px; padding: 0 10px; margin: 0 auto; } .metaNavList li a { color: #666; font-weight: normal; font-size: 14px; list-style: none; text-decoration: none; } .metaNavList li:hover { background: #ddd; } .hidden { display: none; transition: all 400ms ease; transform: scale(0); } .mfaContainer { align-items: center; display: flex; justify-content: center; } .mfaContainer p { color: #222222; margin: 0; margin-right: 1rem; font-size: 1rem; } .mfaContainer a { align-items: center; margin: 0; display: flex; background: #f5f5f5; border: 2px solid #707070; border-radius: 10px; justify-content: center; color: #707070; text-decoration: none; height: 30px; width: 80px; } </style> <nav class="metaNav" data-js-meta-nav-main-container=""> <div class="metaNavCta" data-js-meta-nav-first-cta=""> <a>F5 Sites</a> <svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" viewBox="0 0 24 24"><path d="M0 7.33l2.829-2.83 9.175 9.339 9.167-9.339 2.829 2.83-11.996 12.17z"></path></svg> </div> <ul id="metaFirstList" class="metaNavList hidden" data-js-meta-nav-first-list=""> <li> <a href="https://f5.com/">F5.com</a> </li> <li> <a href="https://account.f5.com/learnf5">LearnF5</a> </li> <li> <a href="https://www.nginx.com/">NGINX</a> </li> <li> <a href="https://my.f5.com/">MyF5</a> </li> <li> <a href="https://partnercentral.f5.com/">Partner Central</a> </li> </ul> <div class="metaNavCta" data-js-meta-nav-second-cta=""> <a>Contact</a> <svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" viewBox="0 0 24 24"><path d="M0 7.33l2.829-2.83 9.175 9.339 9.167-9.339 2.829 2.83-11.996 12.17z"></path></svg> </div> <ul id="metaSecondList" class="metaNavList hidden" data-js-meta-nav-second-list=""> <li> <a href="https://www.f5.com/content/f5-com/en_us/attack">Under Attack?</a> </li> <li> <a href="https://www.f5.com/company/contact/regional-offices#product-support">F5 Support</a> </li> <li> <a href="https://community.f5.com/t5/devcentral-news/support-and-help-for-devcentral-and-offline-contact/ta-p/291959">DevCentral Support</a> </li> <li> <a href="https://www.f5.com/products/get-f5?ls=meta#contactsales">F5 Sales</a> </li> <li> <a href="https://www.nginx.com/contact-sales/">NGINX Sales</a> </li> <li> <a href="https://www.f5.com/services/professional-services/request-f5-professional-services">F5 Professional Services</a> </li> </ul> </nav> </section></article></div><div aria-hidden="true"></div><nav class="Navbar_lia-nav__x3UtG Navbar_lia-nav-fixed__mp9zl" style="--lia-d-nav-bg-combined:hsla(0, 0%, 100%, 0.4)"><div data-testid="ThemedContainer" class="Navbar_lia-container__PneN7 ThemedContainer_lia-fixed-container__MPYgN ThemedContainer_lia-fixed-gutters__1PeHV styles_container__6wTQq"><div class="NavbarHamburgerDropdown_lia-hamburger__wMSGy styles_dropdown__gtmlA"><button data-testid="Button" aria-haspopup="true" aria-expanded="false" aria-label="Side Menu" id=":Resqalbem:" type="button" class="styles_lia-g-unstyled-btn__Sglpm NavbarHamburgerDropdown_lia-hamburger-toggle__A99vU styles_dropdown-toggle__lyIUd styles_btn__1HFm0"><span class="HamburgerIcon_lia-hamburger__Vl1W7"><span class="HamburgerIcon_lia-burger-part__gpOaQ HamburgerIcon_lia-lettuce__CHkD6 NavbarHamburgerDropdown_lia-hamburger-icon__CaJzZ"></span><span class="HamburgerIcon_lia-burger-part__gpOaQ HamburgerIcon_lia-tomato__gEm9r NavbarHamburgerDropdown_lia-hamburger-icon__CaJzZ"></span><span class="HamburgerIcon_lia-burger-part__gpOaQ HamburgerIcon_lia-cheese__4316P NavbarHamburgerDropdown_lia-hamburger-icon__CaJzZ"></span></span></button></div><div class="Navbar_lia-brand-wrap__kMjMv"><a class="Navbar_lia-brand-logo___j4kl" href="/"><img src="https://community.f5.com/t5/s/zihoc95639/m_assets/themes/customTheme1/f5_logo_fix-1704824537976.svg?time=1704824540697" alt="Brand Logo" crossorigin="use-credentials" class="BrandLogo_lia-logo__9HhbP"/></a><a href="#main-content" class="Navbar_lia-skip-content__x8IQ0">Skip to content</a></div><section class="NavbarTextLinks_lia-main-links-container__QOLn4"><div class="NavbarTextLinks_lia-main-links__XTYIO"><div data-menu-open="false" class="NavbarDropdown_lia-dropdown__UxoG7 styles_dropdown__gtmlA"><div aria-haspopup="true" aria-label="Press the down arrow to open the menu" data-testid="NavbarDropdown.Toggle" tabindex="-1" id=":Rausqalbem:"><a tabindex="0" href="/category/Forums" class="styles_lia-g-navbar-link___5V8S NavbarDropdownToggle_lia-link-extender__HG9yN NavbarAnchor_lia-disabled__IqfY3" data-testid="NavbarLink.migrated_link_0" target="_self"><span class="styles_lia-g-navbar-link-text__hNCPc">Forums<svg class="styles_lia-g-navbar-dropdown-icon__MBB_c Icon_lia-icon__on1Gb" data-testid="Icon" style="--lia-local-icon-color:var(--lia-bs-body-color);--lia-local-icon-color-h:var(--lia-bs-body-color-h);--lia-local-icon-color-s:var(--lia-bs-body-color-s);--lia-local-icon-color-l:var(--lia-bs-body-color-l)" aria-hidden="true"><use href="/static/graphics/processed/w78VdNAhVv9lCpAB5qCxSL66EsM/chevron-down.svg#chevron-down"></use></svg></span></a></div></div><div data-menu-open="false" class="NavbarDropdown_lia-dropdown__UxoG7 styles_dropdown__gtmlA"><div aria-haspopup="true" aria-label="Press the down arrow to open the menu" data-testid="NavbarDropdown.Toggle" tabindex="-1" id=":Riusqalbem:"><a tabindex="0" href="/category/CrowdSRC" class="styles_lia-g-navbar-link___5V8S NavbarDropdownToggle_lia-link-extender__HG9yN NavbarAnchor_lia-disabled__IqfY3" data-testid="NavbarLink.migrated_link_3" target="_self"><span class="styles_lia-g-navbar-link-text__hNCPc">CrowdSRC<svg class="styles_lia-g-navbar-dropdown-icon__MBB_c Icon_lia-icon__on1Gb" data-testid="Icon" style="--lia-local-icon-color:var(--lia-bs-body-color);--lia-local-icon-color-h:var(--lia-bs-body-color-h);--lia-local-icon-color-s:var(--lia-bs-body-color-s);--lia-local-icon-color-l:var(--lia-bs-body-color-l)" aria-hidden="true"><use href="/static/graphics/processed/w78VdNAhVv9lCpAB5qCxSL66EsM/chevron-down.svg#chevron-down"></use></svg></span></a></div></div><div data-menu-open="false" class="NavbarDropdown_lia-dropdown__UxoG7 styles_dropdown__gtmlA"><div aria-haspopup="true" aria-label="Press the down arrow to open the menu" data-testid="NavbarDropdown.Toggle" tabindex="-1" id=":Rqusqalbem:"><a tabindex="0" href="/category/Articles" class="styles_lia-g-navbar-link___5V8S NavbarDropdownToggle_lia-link-extender__HG9yN NavbarAnchor_lia-disabled__IqfY3" data-testid="NavbarLink.migrated_link_6" target="_self"><span class="styles_lia-g-navbar-link-text__hNCPc">Articles<svg class="styles_lia-g-navbar-dropdown-icon__MBB_c Icon_lia-icon__on1Gb" data-testid="Icon" style="--lia-local-icon-color:var(--lia-bs-body-color);--lia-local-icon-color-h:var(--lia-bs-body-color-h);--lia-local-icon-color-s:var(--lia-bs-body-color-s);--lia-local-icon-color-l:var(--lia-bs-body-color-l)" aria-hidden="true"><use href="/static/graphics/processed/w78VdNAhVv9lCpAB5qCxSL66EsM/chevron-down.svg#chevron-down"></use></svg></span></a></div></div><div data-menu-open="false" class="NavbarDropdown_lia-dropdown__UxoG7 styles_dropdown__gtmlA"><div aria-haspopup="true" aria-label="Press the down arrow to open the menu" data-testid="NavbarDropdown.Toggle" tabindex="-1" id=":R12usqalbem:"><a tabindex="0" href="/category/GroupsCategory" class="styles_lia-g-navbar-link___5V8S NavbarDropdownToggle_lia-link-extender__HG9yN NavbarAnchor_lia-disabled__IqfY3" data-testid="NavbarLink.migrated_link_9" target="_self"><span class="styles_lia-g-navbar-link-text__hNCPc">Groups<svg class="styles_lia-g-navbar-dropdown-icon__MBB_c Icon_lia-icon__on1Gb" data-testid="Icon" style="--lia-local-icon-color:var(--lia-bs-body-color);--lia-local-icon-color-h:var(--lia-bs-body-color-h);--lia-local-icon-color-s:var(--lia-bs-body-color-s);--lia-local-icon-color-l:var(--lia-bs-body-color-l)" aria-hidden="true"><use href="/static/graphics/processed/w78VdNAhVv9lCpAB5qCxSL66EsM/chevron-down.svg#chevron-down"></use></svg></span></a></div></div><a tabindex="0" href="/category/top/events/Events" class="styles_lia-g-navbar-link___5V8S" data-testid="NavbarLink.migrated_link_12" target="_self"><span class="styles_lia-g-navbar-link-text__hNCPc">Events</span></a><a tabindex="0" href="/category/top/ideas/Suggestions" class="styles_lia-g-navbar-link___5V8S" data-testid="NavbarLink.migrated_link_13" target="_self"><span class="styles_lia-g-navbar-link-text__hNCPc">Suggestions</span></a><a tabindex="0" href="https://community.f5.com/c/how-do-i" class="styles_lia-g-navbar-link___5V8S" data-testid="NavbarLink.Common_external_link" target="_self"><span class="styles_lia-g-navbar-link-text__hNCPc">How Do I...?</span></a></div><div class="NavbarTextLinks_lia-more__Lo2H5"></div></section><section class="Navbar_lia-section__0E_DT Navbar_lia-controls__i63Rp"><a data-testid="AuthenticationLink.registration" class="Navbar_lia-controller-text-link__1JNsW styles_lia-g-navbar-link___5V8S" href="/t5/s/zihoc95639/v1/auth/oidcss/sso_login_redirect/provider/default?referer=https%3A%2F%2Fcommunity.f5.com%2Ftag%2Fsecurity">Register</a><a data-testid="AuthenticationLink.login" class="Navbar_lia-controller-text-link__1JNsW styles_lia-g-navbar-link___5V8S" href="/t5/s/zihoc95639/v1/auth/oidcss/sso_login_redirect/provider/default?referer=https%3A%2F%2Fcommunity.f5.com%2Ftag%2Fsecurity">Sign In</a></section></div></nav><div class="Navbar_lia-nav-spacer__e1b2y" aria-hidden="true"></div><nav aria-label="Breadcrumbs" class="Breadcrumb_lia-nav__ilWY3" style="--lia-local-link-color:#FFFFFF;--lia-local-link-hover-color:#FFFFFF;--lia-local-bg-color:hsla(202.79999999999995, 84.3%, 30%, 0.6);--lia-local-border-bottom:none" data-testid="BreadcrumbWidget"><div data-testid="ThemedContainer" class="styles_d-flex__7__Y_ styles_align-items-center__OKdH0 ThemedContainer_lia-fixed-container__MPYgN ThemedContainer_lia-fixed-gutters__1PeHV styles_container__6wTQq"><ol class="Breadcrumb_lia-crumb-list__Xb5Aw" data-testid="Breadcrumb"><li class="Breadcrumb_lia-crumb-list-item__iXBAq Breadcrumb_lia-crumb-mobile__phoX_" data-testid="Breadcrumb.Mobilecrumb"><a data-testid="nodeLink" target="_self" class="Breadcrumb_lia-crumb-item__CSmrj" aria-label="Place DevCentral" href="/"><svg class="Breadcrumb_lia-crumb-icon-mobile__TE_1C styles_lia-g-icon-size-16__V9Va_ Icon_lia-size-16__D8_m2 Icon_lia-icon__on1Gb" data-testid="Icon" style="--lia-local-icon-color:var(--lia-bs-gray-700);--lia-local-icon-color-h:var(--lia-bs-gray-700-h);--lia-local-icon-color-s:var(--lia-bs-gray-700-s);--lia-local-icon-color-l:var(--lia-bs-gray-700-l)" aria-hidden="true"><use href="/static/graphics/processed/w78VdNAhVv9lCpAB5qCxSL66EsM/chevron-left.svg#chevron-left"></use></svg>DevCentral</a></li><li class="Breadcrumb_lia-crumb-divider__Fy21x" aria-hidden="true"><svg class="Breadcrumb_lia-crumb-icon__ZfovN styles_lia-g-icon-size-12__fO_66 Icon_lia-size-12__l8N3M Icon_lia-icon__on1Gb" data-testid="Icon" style="--lia-local-icon-color:var(--lia-bs-gray-500);--lia-local-icon-color-h:var(--lia-bs-gray-500-h);--lia-local-icon-color-s:var(--lia-bs-gray-500-s);--lia-local-icon-color-l:var(--lia-bs-gray-500-l)" aria-hidden="true"><use href="/static/graphics/processed/w78VdNAhVv9lCpAB5qCxSL66EsM/chevron-right.svg#chevron-right"></use></svg></li><li class="Breadcrumb_lia-crumb-list-item__iXBAq"><span title="Tag: security" class="Breadcrumb_lia-crumb-item__CSmrj" aria-current="location">Tag: security</span></li></ol><div class="Breadcrumb_lia-crumb-actions__fTD_Z"></div></div></nav></header><main id="main-content"><section style="background:var(--lia-bs-white)" class="QuiltSection_lia-section-spacing__WK9AB QuiltSection_lia-section-border-bottom__60ovV" data-testid="QuiltSection-tag-header-widget"><div data-testid="ThemedContainer" class="ThemedContainer_lia-fixed-container__MPYgN styles_container__6wTQq"><div class="styles_row__sjnST"><div style="--lia-content-item-border:none" class="QuiltSection_lia-column__iNmDj styles_col-lg-12__u20eR"><div class="styles_lia-g-section-widget__aHMgk"><header class="TagsHeaderWidget_lia-header__NPDrA"><div class="styles_lia-g-mr-20__8WLMh styles_lia-g-icon-size-80__f0WeA Icon_lia-size-80__uWzC0 Icon_lia-frame__Que5I" style="--lia-local-icon-color:var(--lia-bs-gray-600);--lia-local-icon-color-h:var(--lia-bs-gray-600-h);--lia-local-icon-color-s:var(--lia-bs-gray-600-s);--lia-local-icon-color-l:var(--lia-bs-gray-600-l)"><svg class="Icon_lia-icon__on1Gb" data-testid="Icon" aria-hidden="true"><use href="/static/graphics/processed/w78VdNAhVv9lCpAB5qCxSL66EsM/content-tag.svg#content-tag"></use></svg></div><div><h1 class="TagsHeaderWidget_lia-title__4WUwY">security</h1><span class="TagsHeaderWidget_lia-topics-count__USEHE">17745 Topics</span></div></header></div></div></div></div></section><section class="QuiltSection_lia-section-spacing__WK9AB" data-testid="QuiltSection-messages-list-for-tag-widget"><div data-testid="ThemedContainer" class="ThemedContainer_lia-fixed-container__MPYgN styles_container__6wTQq"><div class="styles_row__sjnST"><div style="--lia-content-item-border:none" class="QuiltSection_lia-column__iNmDj styles_col-lg-12__u20eR"><div class="styles_lia-g-section-widget__aHMgk"><article class="PaneledItemList_lia-panel-list-divider__R11LV styles_text-body__F7QRV" data-testid="PanelItemList.MessageListForNodeByRecentActivityWidget"><nav class="PaneledItemListSubHeader_lia-panel-divider__udXWQ"><div class="OverflowNav_lia-nav__cElDu styles_lia-g-my-0__lzVcy styles_nav__ZeLHd" role="tablist"><div class="OverflowNav_lia-items__mRo8B"><a role="tab" data-testid="OverflowNav.Most Recent" aria-label="Sort By Most Recent" href="/tag/security?messages.widget.messagelistfornodebyrecentactivitywidget-tab-main-messages-list-for-tag-widget-0=mostRecent" data-rb-event-key="mostRecent" aria-selected="true" class="OverflowNav_lia-nav-btn__6GaG3 styles_lia-g-pt-15__653_x OverflowNav_lia-is-active__Jkfl1 styles_nav-link__Mv2ls styles_active__EuuVN">Most Recent</a><a role="tab" data-testid="OverflowNav.Most Viewed" aria-label="Sort By Most Viewed" href="/tag/security?messages.widget.messagelistfornodebyrecentactivitywidget-tab-main-messages-list-for-tag-widget-0=mostViewed" data-rb-event-key="mostViewed" aria-selected="false" class="OverflowNav_lia-nav-btn__6GaG3 styles_lia-g-pt-15__653_x styles_nav-link__Mv2ls">Most Viewed</a><a role="tab" data-testid="OverflowNav.Most Likes" aria-label="Sort By Most Likes" href="/tag/security?messages.widget.messagelistfornodebyrecentactivitywidget-tab-main-messages-list-for-tag-widget-0=mostKudoed" data-rb-event-key="mostKudoed" aria-selected="false" class="OverflowNav_lia-nav-btn__6GaG3 styles_lia-g-pt-15__653_x styles_nav-link__Mv2ls">Most Likes</a></div><div class="OverflowNav_lia-more__qh1FZ"></div></div></nav><section class="PaneledItemList_lia-panel-list-body__FDtRF PaneledItemList_lia-has-footer__CUfyF styles_lia-g-mb-0__AIhaX" role="tabpanel"><ul class="styles_list-group__JHN_Z styles_list-group-flush__FCocl"><li class="PaneledItemList_lia-panel-list-item__bV87f styles_list-group-item__c_btC"><div class="MessageViewInline_lia-message__ALtxi" data-testid="InlineMessageView"><div class="MessageViewInline_lia-left-side__BLlQ_"><a data-hovercard-trigger="true" data-testid="userLink" class="styles_lia-g-mt-5__Gn6_v" aria-label="View Profile: Jordan_Zebor" aria-describedby="UserHoverCard-56757" target="_self" href="/users/jordan_zebor/56757"><span class="UserAvatar_lia-avatar__HFfcv styles_lia-g-icon-size-40__s3x_4" data-testid="userAvatar"><img src="https://community.f5.com/t5/s/zihoc95639/images/dS01Njc1Ny0yMjQwNGkxRjU4NUFCNzdBRjYzQTMz?image-dimensions=40x40" alt="Jordan_Zebor&#x27;s avatar" class="UserAvatar_lia-avatar-img__CUPwZ" aria-hidden="false" crossorigin="use-credentials"/></span></a></div><section class="MessageViewInline_lia-section__mP71c"><div class="MessageViewInline_lia-main__H_QLJ"><h4 title="A Closer Look at mTLS and the Default Server in F5 NGINX" class="styles_text-break__Ny06M MessageViewInline_lia-subject__rxhY_" data-testid="MessageSubject"><a class="MessageViewInline_lia-subject-link__BO63O styles_lia-g-clamp__dg3Sg styles_lia-g-clamp-2__53ACH" data-testid="MessageLink" target="_self" aria-label="A Closer Look at mTLS and the Default Server in F5 NGINX" href="/kb/security-insights/a-closer-look-at-mtls-and-the-default-server-in-f5-nginx/338873">A Closer Look at mTLS and the Default Server in F5 NGINX</a></h4><a class="MessageViewInline_lia-content__wPIos" data-testid="MessageLink" target="_self" tabindex="-1" aria-label="A Closer Look at mTLS and the Default Server in F5 NGINX" href="/kb/security-insights/a-closer-look-at-mtls-and-the-default-server-in-f5-nginx/338873"><span class="styles_lia-g-message-body__LkV7_ styles_lia-g-message-body-tkb__SZmO_ styles_clearfix__xFEoC styles_lia-g-clamp__dg3Sg styles_lia-g-clamp-3__hQHtO MessageViewInline_lia-body__C9SCk MessageViewInline_lia-body-md__SERhT"> When you connect to an HTTPS site, your browser (or other client) typically sends a Server Name Indication (SNI)—the hostname it wants to reach—during the TLS handshake. This lets F5 NGINX figure out which cryptographic settings to use for that specific hostname. In other words, SNI influences: Which x509 certificate is sent to the client Which cryptographic algorithms are offered Which session ticket key is used for encrypting and decrypting session tickets Which session cache is active, if you’re using caching Which Certificate Authority (CA) is checked when you require mutual TLS (mTLS) If the client doesn’t provide SNI or if the hostname doesn’t match any of your configured server_name directives, F5 NGINX defaults to a “fallback” setup—usually called the default server. That means: The default server’s certificate, ciphers, ticket key, and session cache get used automatically. If you haven’t explicitly marked any server block as default_server, F5 NGINX chooses the first block for that listen socket in your configuration as the fallback. Here’s the crucial detail: once the TLS handshake finishes and a certificate has been selected (for example, from the default server), F5 NGINX will still examine the HTTP Host header for request routing. If it specifies a different domain matching another server block, the request is forwarded there at the HTTP layer. From the client’s perspective, however, the originally cryptographic settings remain in effect, because the TLS negotiation is already complete. Single Server Block In the simplest configuration, only one server block listens for TLS connections on a given IP address and port: server { listen 443 ssl; server_name example.com; ssl_certificate /etc/ssl/certs/example.com.crt; ssl_certificate_key /etc/ssl/private/example.com.key; ssl_client_certificate /etc/ssl/certs/ca.crt; ssl_verify_client on; # Additional configuration, such as locations and logging } In this example: If the client provides SNI matching example.com, F5 NGINX presents /etc/ssl/certs/example.com.crt and verifies the client certificate against /etc/ssl/certs/ca.crt. If the client does not provide SNI, this same server block still handles the request because there are no other blocks to consider; the same certificate and CA (ca.crt) apply. Once authenticated, the client proceeds under the cryptographic settings of this single server block. With only one server block present, there is no additional routing or fallback scenario to manage. Multiple Server Blocks on the Same IP/Port When multiple server blocks listen on the same IP address and port, F5 NGINX uses SNI to determine which server block should handle the request. If no matching SNI is found, requests fall back to the server marked with default_server. As previously stated, if the default_server is not explicitly defined, F5 NGINX will use the first server block in the configuration as the fallback. # example.com and the default server (first in config) server { listen 443 ssl; server_name example.com; ssl_certificate /etc/ssl/certs/example.com.crt; ssl_certificate_key /etc/ssl/private/example.com.key; ssl_client_certificate /etc/ssl/certs/ca_A.crt; ssl_verify_client on; # Additional configuration, such as locations and logging } # www.example.com server { listen 443 ssl; server_name www.example.com; ssl_certificate /etc/ssl/certs/www.example.com.crt; ssl_certificate_key /etc/ssl/private/www.example.com.key; ssl_client_certificate /etc/ssl/certs/ca_B.crt; ssl_verify_client on; # Additional configuration, such as locations and logging } In this example: If the client provides SNI matching example.com, the first server block’s certificate (example.com.crt) and CA settings (ca_A.crt) are used. If the client provides SNI matching www.example.com, the second server block’s certificate (www.example.com.crt) and CA settings (ca_B.crt) are used. If the client does not provide SNI (or provides an unmatched server name), the first server block (example.com) acts as the default. Its certificate (example.com.crt) and CA (ca_A.crt) apply for the TLS handshake. After TLS is established under the default server, if the HTTP Host header is www.example.com, F5 NGINX routes the request to the second server block for application-level processing. However, the TLS session—including which certificate and CA were used—remains with the default server’s settings. This means the second server’s client certificate configuration (ca_B.crt) is not involved in re-validating the client, since no new TLS handshake occurs. Recommendations The fallback behavior mentioned above might not fit all use cases. If it poses a risk or doesn’t align with your security needs, consider reconfiguring F5 NGINX (e.g., setting up a stub default server or applying tighter mTLS rules) to restrict or eliminate this fallback path. Defining a Default Server (or Stub Default Server) It is highly recommended to define a default server in F5 NGINX. If you do not want to allow fallback for clients without valid SNI, you can set up a stub default server (configuration example below). A stub default server, as shown below, ensures that unmatched SNI (or no SNI) connections are rejected at the handshake level, preventing unintended fallback to a less restrictive configuration. Perhaps most importantly, it does not contain any client authentication configuration directives, forcing client authentication to occur in the most specific server blocks. In the example below I have added `ssl_verify_client off;` for illustrative purposes, however the setting of `off` is the default. Note: ssl_reject_handshake appeared in nginx version 1.19.4. For versions prior to that, one can define a server that simply returns the special 444 HTTP response code. Authorization Checks in All Server Blocks Even with a stub default server, all server blocks should implement authorization checks if they serve sensitive content. Because requests may be forwarded from the default server to a non-default server after decryption, every server block must enforce its own mTLS policies and check variables such as $ssl_client_s_dn or $ssl_client_i_dn (if you rely on client certificates) to ensure consistent and robust security across your deployment. # explicit default server server { listen 443 ssl default_server; ssl_reject_handshake on; ssl_verify_client off; ssl_protocols TLSv1.2 TLSv1.3; } # example.com server { listen 443 ssl; server_name example.com; ssl_certificate /etc/ssl/certs/example.com.crt; ssl_certificate_key /etc/ssl/private/example.com.key; ssl_client_certificate /etc/ssl/certs/ca_A.crt; ssl_verify_client on; # Check subject DN if ($ssl_client_s_dn !~ "CN=TrustedClient_A,O=MyOrg") { return 403; } # Check issuer DN (this may not be necessary for all deployments) if ($ssl_client_i_dn !~ "CN=TrustedCA_A,O=MyOrg") { return 403; } # Additional configuration, such as locations and logging } # This server block handles requests for www.example.com server { listen 443 ssl; server_name www.example.com; ssl_certificate /etc/ssl/certs/www.example.com.crt; ssl_certificate_key /etc/ssl/private/www.example.com.key; ssl_client_certificate /etc/ssl/certs/ca_B.crt; ssl_verify_client on; # Check subject DN if ($ssl_client_s_dn !~ "CN=TrustedClient_B,O=MyOrg") { return 403; } # Check issuer DN (this may not be necessary for all deployments) if ($ssl_client_i_dn !~ "CN=TrustedCA_B,O=MyOrg") { return 403; } # Additional configuration, such as locations and logging } Conclusion In summary, working with multiple server blocks, SNI, and mTLS can make F5 NGINX setups more complex. Knowing precisely which server block handles the TLS handshake—particularly when there is no SNI or an unmatched name—helps maintain the desired security posture. Careful attention to these details keeps certificates and policies consistent for all client connections. </span></a></div><div class="MessageViewInline_lia-footer__gNh52"><div class="MessageViewInline_lia-footer-section__99rW3 MessageViewInline_lia-footer-left__gAfgM"><div class="MessageViewInline_lia-byline__I93OZ MessageViewInline_lia-byline-md__VW8Gt"><div class="styles_lia-g-divider__X68T2 MessageViewInline_lia-author-info__8PVPG"><a data-hovercard-trigger="true" data-testid="userLink" class="MessageViewInline_lia-byline-item__kxYvN" aria-label="View Profile: Jordan_Zebor" aria-describedby="UserHoverCard-56757" target="_self" href="/users/jordan_zebor/56757">Jordan_Zebor</a></div><a class="styles_lia-g-divider__X68T2 MessageViewInline_lia-byline-item__kxYvN" data-testid="MessageLink" target="_self" aria-label="6 hours ago" href="/kb/security-insights/a-closer-look-at-mtls-and-the-default-server-in-f5-nginx/338873"><span data-testid="messageTime"><span title="February 26, 2025 at 9:27 PM" role="none">Feb 26, 2025</span></span></a><a data-hovercard-trigger="true" data-testid="nodeLink" target="_self" class="styles_lia-g-divider__X68T2 MessageViewInline_lia-byline-item__kxYvN MessageViewInline_lia-node__eqyXY" aria-label="Go to parent Security Insights" href="/category/articles/kb/security-insights"><svg class="styles_lia-g-icon-size-12__fO_66 Icon_lia-size-12__l8N3M Icon_lia-icon__on1Gb" data-testid="Icon" style="--lia-local-icon-color:var(--lia-tkb-color);--lia-local-icon-color-h:var(--lia-tkb-color-h);--lia-local-icon-color-s:var(--lia-tkb-color-s);--lia-local-icon-color-l:var(--lia-tkb-color-l)" aria-label="Content Type Knowledge Base icon"><use href="/static/graphics/processed/w78VdNAhVv9lCpAB5qCxSL66EsM/content-knowledge.svg#content-knowledge"></use></svg><span class="styles_sr-only__NOnjB styles_h-auto__SoSGz">Place Security Insights</span><span aria-hidden="true">Security Insights</span></a></div></div><div class="MessageViewInline_lia-footer-section__99rW3 MessageViewInline_lia-footer-right__mxWEA"><div class="styles_lia-g-count-wrap___e35P" data-testid="ViewCount"><svg class="styles_lia-g-icon-size-16__V9Va_ Icon_lia-size-16__D8_m2 Icon_lia-icon__on1Gb" data-testid="Icon" style="--lia-local-icon-color:var(--lia-bs-gray-600);--lia-local-icon-color-h:var(--lia-bs-gray-600-h);--lia-local-icon-color-s:var(--lia-bs-gray-600-s);--lia-local-icon-color-l:var(--lia-bs-gray-600-l)" aria-hidden="true"><use href="/static/graphics/processed/w78VdNAhVv9lCpAB5qCxSL66EsM/views.svg#views"></use></svg>81<span class="styles_sr-only__NOnjB">Views</span></div><div class="styles_lia-g-count-wrap___e35P" data-testid="kudosCount"><svg class="styles_lia-g-icon-size-16__V9Va_ Icon_lia-size-16__D8_m2 Icon_lia-icon__on1Gb" data-testid="Icon" style="--lia-local-icon-color:var(--lia-bs-gray-600);--lia-local-icon-color-h:var(--lia-bs-gray-600-h);--lia-local-icon-color-s:var(--lia-bs-gray-600-s);--lia-local-icon-color-l:var(--lia-bs-gray-600-l)" aria-hidden="true"><use href="/static/graphics/processed/w78VdNAhVv9lCpAB5qCxSL66EsM/like.svg#like"></use></svg>2<span class="styles_sr-only__NOnjB">likes</span></div><div class="styles_lia-g-count-wrap___e35P" data-testid="messageRepliesCount"><svg class="styles_lia-g-icon-size-16__V9Va_ Icon_lia-size-16__D8_m2 Icon_lia-icon__on1Gb" data-testid="Icon" style="--lia-local-icon-color:var(--lia-bs-gray-600);--lia-local-icon-color-h:var(--lia-bs-gray-600-h);--lia-local-icon-color-s:var(--lia-bs-gray-600-s);--lia-local-icon-color-l:var(--lia-bs-gray-600-l)" aria-hidden="true"><use href="/static/graphics/processed/w78VdNAhVv9lCpAB5qCxSL66EsM/comment.svg#comment"></use></svg>0<span class="styles_sr-only__NOnjB">Comments</span></div></div></div></section></div></li><li class="PaneledItemList_lia-panel-list-item__bV87f styles_list-group-item__c_btC"><div class="MessageViewInline_lia-message__ALtxi" data-testid="InlineMessageView"><div class="MessageViewInline_lia-left-side__BLlQ_"><a data-hovercard-trigger="true" data-testid="userLink" class="styles_lia-g-mt-5__Gn6_v" aria-label="View Profile: Christopher_Pa1" aria-describedby="UserHoverCard-217342" target="_self" href="/users/christopher_pa1/217342"><span class="UserAvatar_lia-avatar__HFfcv styles_lia-g-icon-size-40__s3x_4" data-testid="userAvatar"><img src="https://community.f5.com/t5/s/zihoc95639/images/dS0yMTczNDItSUNpMG9j?image-coordinates=0%2C0%2C160%2C160&amp;image-dimensions=40x40" alt="Christopher_Pa1&#x27;s avatar" class="UserAvatar_lia-avatar-img__CUPwZ" aria-hidden="false" crossorigin="use-credentials"/></span></a></div><section class="MessageViewInline_lia-section__mP71c"><div class="MessageViewInline_lia-main__H_QLJ"><h4 title="U.S. Government cuts, Majorana 1 Chip, CVEs for Mongoose and OpenSSH" class="styles_text-break__Ny06M MessageViewInline_lia-subject__rxhY_" data-testid="MessageSubject"><a class="MessageViewInline_lia-subject-link__BO63O styles_lia-g-clamp__dg3Sg styles_lia-g-clamp-2__53ACH" data-testid="MessageLink" target="_self" aria-label="U.S. Government cuts, Majorana 1 Chip, CVEs for Mongoose and OpenSSH" href="/kb/security-insights/u-s-government-cuts-majorana-1-chip-cves-for-mongoose-and-openssh/339995">U.S. Government cuts, Majorana 1 Chip, CVEs for Mongoose and OpenSSH</a></h4><a class="MessageViewInline_lia-content__wPIos" data-testid="MessageLink" target="_self" tabindex="-1" aria-label="U.S. Government cuts, Majorana 1 Chip, CVEs for Mongoose and OpenSSH" href="/kb/security-insights/u-s-government-cuts-majorana-1-chip-cves-for-mongoose-and-openssh/339995"><span class="styles_lia-g-message-body__LkV7_ styles_lia-g-message-body-tkb__SZmO_ styles_clearfix__xFEoC styles_lia-g-clamp__dg3Sg styles_lia-g-clamp-3__hQHtO MessageViewInline_lia-body__C9SCk MessageViewInline_lia-body-md__SERhT"> Notable news for the week of February 17th through February 24th. Your editor this week is Chris from the F5 Security Incident Response Team. For this edition, we discuss U.S. government cuts to cyber security and consumer protections; Microsoft’s advancement in the field of quantum computing, and new flaws found in both MongoDB as well as OpenSSH. Cuts to Cyber and Consumer Protections With the new administration in the US, there have been a large amount of job cuts throughout the federal government. This also includes at least 130 employees being fired from the Cybersecurity and Infrastructure Security Agency (CISA). These cuts are reported to include staff dedicated to election security, fighting misinformation, and foreign influence operations. Along with the cuts, the Department of Government Efficiency (DOGE) arrived at CISA and were given access to the agency’s email and files. DOGE has been gaining access to many sensitive federal agencies that contain a large amount of personal and financial information on Americans. These agencies include the Social Security Administration (SSA), the Department of Homeland Security, the Office of Personnel Management (OPM), and the Treasury Department. DOGE has also been trying to gain access to the systems of the Internal Revenue Service (IRS). From a security standpoint, this is extremely alarming because it appears to be bypassing many security safeguards and measures. This sentiment is reported by many security experts. Another aspect that does not inspire confidence is that the doge.gov website administrators had left their database wide open, allowing someone to publish messages making fun of the insecurity that the site has. On the aspect of consumer protection, the Consumer Financial Protection Bureau (CFPB) was ordered to stop most work. The CFPB was created in 2011 to protect consumers from financial institutions that violate consumer protection laws. The newly appointed CFPB director, Russell Vought, has publicly favored abolishing the agency which is alarming since it would remove some of the regulations that exist. https://krebsonsecurity.com/2025/02/trump-2-0-brings-cuts-to-cyber-consumer-protections/ Microsoft's Majorana 1 Chip Microsoft has announced the world's first quantum processor that uses topological qubits. They have named this the Majorana 1. They have designed this to scale to a million qubits on a single chip. Typical qubits are highly sensitive to noise in the environment. This can cause them to lose their quantum state introducing errors. This is known as decoherence. To counter this there needs to be many more qubits added for error correction which means a lot more room needed for just one qubit to work. Topological qubits work by encoding information in the topology of the physical system which in theory, makes each qubit more fault tolerant. Essentially, this means few are needed in the long run to produce a quantum computer. This is a huge achievement but along with it comes the security concerns. The main concern being the ability to do quantum decryption. This technology brings the reality of a fault tolerant protype to years instead of decades. Many believe this will be within 5 to 10 years. https://www.securityweek.com/what-microsofts-majorana-1-chip-means-for-quantum-decryption/ Critical MongoDB Library Flaws Two critical vulnerabilities in a third-party library that MongoDB relies on was found which can lead to stolen data or code to be ran. Mongoose is an Object Data Modeling (ODM) library used by MongoDB to enable database integrations in Node.js applications. Researchers at OPSWAT revealed two critical security flaws that threaten the integrity of data stored in MongoDB as well as opening it up to theft, manipulation, or destruction. This first CVE is CVE-2024-53900 which is given a CVSS score of 9.1. This is an SQL injection bug which allows a specially crafted query to bypass MongoDB's server-side JavaScript restrictions potentially leading to a remote code execution (RCE). This was reported in November and patched in version 8.8.3. The second CVE is CVE-2025-23061 with a CVSS score of 9.0. This was found by the same researcher and is actually a bypass in the patched version that still allowed for RCE. This was addressed in version 8.9.5. https://www.theregister.com/2025/02/20/mongoose_flaws_mongodb/ New OpenSSH Flaws Two new security vulnerabilities have been found in the OpenSSH suite which could result in an active Machine-in-the-Middle (MitM) or a Denial-of-Service (DoS) attack under specific conditions. The first is CVE-2025-26465 with a CVSS score of 6.8. The OpenSSH client contains a logic error between versions 6.8p1 to 9.9p1 (inclusive) that makes it vulnerable to a MitM attack if the VerifyHostKeyDNS option is enabled. The second is CVE-2025-26466 with a CVSS score of 5.9. The OpenSSH client and server are vulnerable to a pre-authentication DoS attack between versions 9.5p1 to 9.9p1 (inclusive) that causes memory and CPU consumption. A successful exploitation of the first one could permit malicious actors to compromise and hijack SSH sessions and possibly gain access to sensitive data. The VerifyHostKeyDNS is disabled by default. Exploitation of the second CVE can result in availability issues as indicated by labeling as a DoS vulnerability. Both of these CVEs have been addressed in version 9.9p2 of OpenSSH which was released on February 18th. https://thehackernews.com/2025/02/new-openssh-flaws-enable-man-in-middle.html </span></a></div><div class="MessageViewInline_lia-footer__gNh52"><div class="MessageViewInline_lia-footer-section__99rW3 MessageViewInline_lia-footer-left__gAfgM"><div class="MessageViewInline_lia-byline__I93OZ MessageViewInline_lia-byline-md__VW8Gt"><div class="styles_lia-g-divider__X68T2 MessageViewInline_lia-author-info__8PVPG"><a data-hovercard-trigger="true" data-testid="userLink" class="MessageViewInline_lia-byline-item__kxYvN" aria-label="View Profile: Christopher_Pa1" aria-describedby="UserHoverCard-217342" target="_self" href="/users/christopher_pa1/217342">Christopher_Pa1</a></div><a class="styles_lia-g-divider__X68T2 MessageViewInline_lia-byline-item__kxYvN" data-testid="MessageLink" target="_self" aria-label="8 hours ago" href="/kb/security-insights/u-s-government-cuts-majorana-1-chip-cves-for-mongoose-and-openssh/339995"><span data-testid="messageTime"><span title="February 26, 2025 at 7:26 PM" role="none">Feb 26, 2025</span></span></a><a data-hovercard-trigger="true" data-testid="nodeLink" target="_self" class="styles_lia-g-divider__X68T2 MessageViewInline_lia-byline-item__kxYvN MessageViewInline_lia-node__eqyXY" aria-label="Go to parent Security Insights" href="/category/articles/kb/security-insights"><svg class="styles_lia-g-icon-size-12__fO_66 Icon_lia-size-12__l8N3M Icon_lia-icon__on1Gb" data-testid="Icon" style="--lia-local-icon-color:var(--lia-tkb-color);--lia-local-icon-color-h:var(--lia-tkb-color-h);--lia-local-icon-color-s:var(--lia-tkb-color-s);--lia-local-icon-color-l:var(--lia-tkb-color-l)" aria-label="Content Type Knowledge Base icon"><use href="/static/graphics/processed/w78VdNAhVv9lCpAB5qCxSL66EsM/content-knowledge.svg#content-knowledge"></use></svg><span class="styles_sr-only__NOnjB styles_h-auto__SoSGz">Place Security Insights</span><span aria-hidden="true">Security Insights</span></a></div></div><div class="MessageViewInline_lia-footer-section__99rW3 MessageViewInline_lia-footer-right__mxWEA"><div class="styles_lia-g-count-wrap___e35P" data-testid="ViewCount"><svg class="styles_lia-g-icon-size-16__V9Va_ Icon_lia-size-16__D8_m2 Icon_lia-icon__on1Gb" data-testid="Icon" style="--lia-local-icon-color:var(--lia-bs-gray-600);--lia-local-icon-color-h:var(--lia-bs-gray-600-h);--lia-local-icon-color-s:var(--lia-bs-gray-600-s);--lia-local-icon-color-l:var(--lia-bs-gray-600-l)" aria-hidden="true"><use href="/static/graphics/processed/w78VdNAhVv9lCpAB5qCxSL66EsM/views.svg#views"></use></svg>108<span class="styles_sr-only__NOnjB">Views</span></div><div class="styles_lia-g-count-wrap___e35P" data-testid="kudosCount"><svg class="styles_lia-g-icon-size-16__V9Va_ Icon_lia-size-16__D8_m2 Icon_lia-icon__on1Gb" data-testid="Icon" style="--lia-local-icon-color:var(--lia-bs-gray-600);--lia-local-icon-color-h:var(--lia-bs-gray-600-h);--lia-local-icon-color-s:var(--lia-bs-gray-600-s);--lia-local-icon-color-l:var(--lia-bs-gray-600-l)" aria-hidden="true"><use href="/static/graphics/processed/w78VdNAhVv9lCpAB5qCxSL66EsM/like.svg#like"></use></svg>1<span class="styles_sr-only__NOnjB">like</span></div><div class="styles_lia-g-count-wrap___e35P" data-testid="messageRepliesCount"><svg class="styles_lia-g-icon-size-16__V9Va_ Icon_lia-size-16__D8_m2 Icon_lia-icon__on1Gb" data-testid="Icon" style="--lia-local-icon-color:var(--lia-bs-gray-600);--lia-local-icon-color-h:var(--lia-bs-gray-600-h);--lia-local-icon-color-s:var(--lia-bs-gray-600-s);--lia-local-icon-color-l:var(--lia-bs-gray-600-l)" aria-hidden="true"><use href="/static/graphics/processed/w78VdNAhVv9lCpAB5qCxSL66EsM/comment.svg#comment"></use></svg>0<span class="styles_sr-only__NOnjB">Comments</span></div></div></div></section></div></li><li class="PaneledItemList_lia-panel-list-item__bV87f styles_list-group-item__c_btC"><div class="MessageViewInline_lia-message__ALtxi" data-testid="InlineMessageView"><div class="MessageViewInline_lia-left-side__BLlQ_"><a data-hovercard-trigger="true" data-testid="userLink" class="styles_lia-g-mt-5__Gn6_v" aria-label="View Profile: Ted_Byerly" aria-describedby="UserHoverCard-275378" target="_self" href="/users/ted_byerly/275378"><span class="UserAvatar_lia-avatar__HFfcv styles_lia-g-icon-size-40__s3x_4" data-testid="userAvatar"><img src="https://community.f5.com/t5/s/zihoc95639/m_assets/avatars/default/avatar-10.svg?image-dimensions=40x40" alt="Ted_Byerly&#x27;s avatar" class="UserAvatar_lia-avatar-img__CUPwZ" aria-hidden="false" crossorigin="use-credentials"/></span></a></div><section class="MessageViewInline_lia-section__mP71c"><div class="MessageViewInline_lia-main__H_QLJ"><h4 title="F5 Distributed Cloud Security Service Insertion With BIG-IP Advanced WAF" class="styles_text-break__Ny06M MessageViewInline_lia-subject__rxhY_" data-testid="MessageSubject"><a class="MessageViewInline_lia-subject-link__BO63O styles_lia-g-clamp__dg3Sg styles_lia-g-clamp-2__53ACH" data-testid="MessageLink" target="_self" aria-label="F5 Distributed Cloud Security Service Insertion With BIG-IP Advanced WAF" href="/kb/technicalarticles/f5-distributed-cloud-security-service-insertion-with-big-ip-advanced-waf/293896">F5 Distributed Cloud Security Service Insertion With BIG-IP Advanced WAF</a></h4><a class="MessageViewInline_lia-content__wPIos" data-testid="MessageLink" target="_self" tabindex="-1" aria-label="F5 Distributed Cloud Security Service Insertion With BIG-IP Advanced WAF" href="/kb/technicalarticles/f5-distributed-cloud-security-service-insertion-with-big-ip-advanced-waf/293896"><span class="styles_lia-g-message-body__LkV7_ styles_lia-g-message-body-tkb__SZmO_ styles_clearfix__xFEoC styles_lia-g-clamp__dg3Sg styles_lia-g-clamp-3__hQHtO MessageViewInline_lia-body__C9SCk MessageViewInline_lia-body-md__SERhT"> In this article we will show you how to quickly deploy and operate external services of your choice across multiple public clouds. For this article I will select the BIG-IP Advanced WAF (PAYG), future articles will cover additional solutions. Co-Author: Anitha Mareedu, Sr. Security Engineer, F5 Introduction F5’s Distributed Cloud Securtiy Service Insertion solution allows enterprises to deploy and operate external services of their choice across multiple public clouds. Let's start by looking at a real-world customer example. The enterprise has standardized on an external firewall in their private data center. Their network and security team are very familiar with using BIG-IP AWAF. They want to deploy the same security firewall solution that they use in the private datacenter in the public cloud. The requirements are: a simple operational model to deploy these services a unified security policy consistency across different clouds simple deployments unified logging Challenges Customers have identified several challenges in moving to the cloud. Initallly, teams that are very familiar with supporting services in their private data center usually do not have the expertise in designing, deploying and supporting in public clouds. If the same team then is tasked with deploying to multiple clouds the gap widens, terminology, archtitecture tools and constructs are all unique. Second, the operational models are different across different clouds. In AWS, you use either a VPC or a transit gateway (TGW), in Azure you use a VNET and Google has VPC’s. Solution Description Let's look at how F5’s Distributed Cloud Security Service insertion solution helps simplify and unify security solution deployments in multi-cloud and hybrid cloud environments: Infrastructure-as-code: Implementation and policy configuration can be automated and run as infrastructure-as-code across clouds and regions, allowing policies to be repeatable in any major public or private cloud. Easy setup and management: This simplified setup and management extends across AWS, Azure, and other clouds, as the F5 Distributed Cloud Platform supports AWS Transit Gateway, virtual network peering in Azure, and use of VPC attachments. Define once and replicate models: No extra handcrafting is needed for consistent, straightforward operations and deployment. Unified traffic steering rules: With the Distributed Cloud Platform, traffic is rerouted from networks through the security service using the same steering rules across different public and private clouds. Using F5 Distributed Cloud Console, IT pros get granular visibility and single-pane-of-glass management of traffic across clouds and networks. Optional policy deployment routes: Policies can be deployed at either or both the network layer (using IP addresses) or the application layer (using APIs). Diagram Step by Step Process This walk thru assumes you already have an AWS VPC deployed. Have handy the VPC id. Log into the F5 Distributed Cloud Dashboard You are presented with the Dashboard where you can choose which deployment option you want to work with. We will be working with Cloud and Edge Sites. Select Cloud and Edge Sites &gt; Manage &gt; Site Management &gt; AWS TWG Sites Click Add the AWS Transit Gateway (TWG) Under Metadata give your TWG site a Name, Label and Description Click on Configure under AWS Configuration This brings up the Services VPC Configuration Page Select your AWS region Select Services VPC, leave as New, let it genetrate a name or choose your own name and give the Primary CIDR block you want to assign to the VPC. Leave Transit Gateway as New TWG Leave BGP as Automatic Under Site Node Parameters, Ingress/ Egress select “Add Item” Move slider on upper right corner to Show Advanced Fields Fill in required configuration, AWS AZ Name and CIDR Blocks for each of the the subnets and click the “Add Item” You can let the system autogenerate these or assign the desired range. This will take you back to the last screen, where you need to either create or select your cloud credentials. These are Programmatic Access Credentials allowing API access. Click Apply This takes you to the previous screen where we connect your current VPC to the Service VPC we are creating. (have VPC id available) Click Configure under VPC attachments Click Add Item Supply VPC id Click Apply This takes you back once again to the AWS TWG Site Screen. Finish with clicking Save and Exit. In the UI you will then click Apply. You are now deploying your new Security VPC via Terraform. While that is deploying we will move on to the External Services. Manage &gt; Site Management &gt; External Services &gt; Add External Service Give your Service a name, add a label and description. Click “Configure” under Select NFV Service Provider. For this article we will select the F5 BIG-IP Advanced WAF (PAYG), future articles will cover additional solutions. Provide the Admin Password Admin Username public SSH Key that you will use to access your BIG-IP deployment. Select the TWG site you created above. Finally click “Add Item“ under Service Nodes. Service nodes Enter a Node name and the Avilibilty Zones you wish to delpoy into. Then click “Add Item” This will take you back to the original screen. Enable HTTPS Management of Nodes, supply a delegated doman that will issue a Certificate. Under Select Service Type” Keep Inside VIP at Automatic and Set the Outside VIP to “Advertise On Outside Network”. Finally Click “Save and Exit” At the end, the External Security Service is deployed, and you are taken to all the External Services. Click the name of the External Service you deployed to expand the details From this screen you are able to access several items, the two I want to point out are the TGW stats and the BIG-IP you deployed by clicking the Management Dashboard URL. Click under Site the TWG Service you deployed Here you are able to see fine grained stats under all the tabs. System Metrics Application Metrics Site Status Nodes Interfaces Alerts Requests Top Talkers Connections TWG Flow tables DHCP Status Objects Tools Going back click the hyperlink to the BIG-IP if you wish to look at the configuration. F5 Distributed Cloud Service Insertion automatically configured your BIG-IP with the following information: • Interfaces • Self IPs • Routes • Management and credentials • VLANs • IPoIP tunnel SI&lt;-&gt; BIG-IP • VIP The following two items will need to be configured on your BIG-IP. This configuration Configure AWAF policies SecOps can access familiar BIG-IP UI using management link provided in F5 Cloud Console and set up and configure AWAF ploicies Define a Traffic Steering Policy Network traffic to define traffic steering policy at Network (L3/L4) layer Service policy to define traffic steering policy at App(L7) level. Below are the traffic steering control methods available: Network level – Ip address, port, etc App level – API, Method, etc At the end of this step, you can see traffic getting diverted to BIG-IP and getting inspected by BIG-IP. Summary As you can see, F5 Distributed Cloud Security Service Insertion dramatically reduces the operation complexity for deploying external services in public clouds, it greatly enhances the security posture and it vastly improves productivity for all the operations teams such as NetOps, SecOps or DevOps. </span><img src="https://community.f5.com/t5/s/zihoc95639/images/bS0yOTM4OTYtMTcyNjlpNUQ3RjAwRjdFRjM3NUZBNg?image-dimensions=300x400&amp;constrain-image=true" alt="" data-testid="messagePreviewImage" crossorigin="use-credentials" class="MessageViewInline_lia-preview-img__v_cnb"/></a></div><div class="MessageViewInline_lia-footer__gNh52"><div class="MessageViewInline_lia-footer-section__99rW3 MessageViewInline_lia-footer-left__gAfgM"><div class="MessageViewInline_lia-byline__I93OZ MessageViewInline_lia-byline-md__VW8Gt"><div class="styles_lia-g-divider__X68T2 MessageViewInline_lia-author-info__8PVPG"><a data-hovercard-trigger="true" data-testid="userLink" class="MessageViewInline_lia-byline-item__kxYvN" aria-label="View Profile: Ted_Byerly" aria-describedby="UserHoverCard-275378" target="_self" href="/users/ted_byerly/275378">Ted_Byerly</a></div><a class="styles_lia-g-divider__X68T2 MessageViewInline_lia-byline-item__kxYvN" data-testid="MessageLink" target="_self" aria-label="11 hours ago" href="/kb/technicalarticles/f5-distributed-cloud-security-service-insertion-with-big-ip-advanced-waf/293896"><span data-testid="messageTime"><span title="February 26, 2025 at 4:38 PM" role="none">Feb 26, 2025</span></span></a><a data-hovercard-trigger="true" data-testid="nodeLink" target="_self" class="styles_lia-g-divider__X68T2 MessageViewInline_lia-byline-item__kxYvN MessageViewInline_lia-node__eqyXY" aria-label="Go to parent Technical Articles" href="/category/articles/kb/technicalarticles"><svg class="styles_lia-g-icon-size-12__fO_66 Icon_lia-size-12__l8N3M Icon_lia-icon__on1Gb" data-testid="Icon" style="--lia-local-icon-color:var(--lia-tkb-color);--lia-local-icon-color-h:var(--lia-tkb-color-h);--lia-local-icon-color-s:var(--lia-tkb-color-s);--lia-local-icon-color-l:var(--lia-tkb-color-l)" aria-label="Content Type Knowledge Base icon"><use href="/static/graphics/processed/w78VdNAhVv9lCpAB5qCxSL66EsM/content-knowledge.svg#content-knowledge"></use></svg><span class="styles_sr-only__NOnjB styles_h-auto__SoSGz">Place Technical Articles</span><span aria-hidden="true">Technical Articles</span></a></div></div><div class="MessageViewInline_lia-footer-section__99rW3 MessageViewInline_lia-footer-right__mxWEA"><div class="styles_lia-g-count-wrap___e35P" data-testid="ViewCount"><svg class="styles_lia-g-icon-size-16__V9Va_ Icon_lia-size-16__D8_m2 Icon_lia-icon__on1Gb" data-testid="Icon" style="--lia-local-icon-color:var(--lia-bs-gray-600);--lia-local-icon-color-h:var(--lia-bs-gray-600-h);--lia-local-icon-color-s:var(--lia-bs-gray-600-s);--lia-local-icon-color-l:var(--lia-bs-gray-600-l)" aria-hidden="true"><use href="/static/graphics/processed/w78VdNAhVv9lCpAB5qCxSL66EsM/views.svg#views"></use></svg>2.1K<span class="styles_sr-only__NOnjB">Views</span></div><div class="styles_lia-g-count-wrap___e35P" data-testid="kudosCount"><svg class="styles_lia-g-icon-size-16__V9Va_ Icon_lia-size-16__D8_m2 Icon_lia-icon__on1Gb" data-testid="Icon" style="--lia-local-icon-color:var(--lia-bs-gray-600);--lia-local-icon-color-h:var(--lia-bs-gray-600-h);--lia-local-icon-color-s:var(--lia-bs-gray-600-s);--lia-local-icon-color-l:var(--lia-bs-gray-600-l)" aria-hidden="true"><use href="/static/graphics/processed/w78VdNAhVv9lCpAB5qCxSL66EsM/like.svg#like"></use></svg>3<span class="styles_sr-only__NOnjB">likes</span></div><div class="styles_lia-g-count-wrap___e35P" data-testid="messageRepliesCount"><svg class="styles_lia-g-icon-size-16__V9Va_ Icon_lia-size-16__D8_m2 Icon_lia-icon__on1Gb" data-testid="Icon" style="--lia-local-icon-color:var(--lia-bs-gray-600);--lia-local-icon-color-h:var(--lia-bs-gray-600-h);--lia-local-icon-color-s:var(--lia-bs-gray-600-s);--lia-local-icon-color-l:var(--lia-bs-gray-600-l)" aria-hidden="true"><use href="/static/graphics/processed/w78VdNAhVv9lCpAB5qCxSL66EsM/comment.svg#comment"></use></svg>0<span class="styles_sr-only__NOnjB">Comments</span></div></div></div></section></div></li><li class="PaneledItemList_lia-panel-list-item__bV87f styles_list-group-item__c_btC"><div class="MessageViewInline_lia-message__ALtxi" data-testid="InlineMessageView"><div class="MessageViewInline_lia-left-side__BLlQ_"><a data-hovercard-trigger="true" data-testid="userLink" class="styles_lia-g-mt-5__Gn6_v" aria-label="View Profile: Hardeep_Kaur" aria-describedby="UserHoverCard-214133" target="_self" href="/users/hardeep_kaur/214133"><span class="UserAvatar_lia-avatar__HFfcv styles_lia-g-icon-size-40__s3x_4" data-testid="userAvatar"><img src="https://community.f5.com/t5/s/zihoc95639/m_assets/avatars/custom/Frankenstack_02-1706129554890.svg?image-dimensions=40x40" alt="Hardeep_Kaur&#x27;s avatar" class="UserAvatar_lia-avatar-img__CUPwZ" aria-hidden="false" crossorigin="use-credentials"/></span></a></div><section class="MessageViewInline_lia-section__mP71c"><div class="MessageViewInline_lia-main__H_QLJ"><h4 title="APM Configuration to Support Duo MFA using iRule" class="styles_text-break__Ny06M MessageViewInline_lia-subject__rxhY_" data-testid="MessageSubject"><a class="MessageViewInline_lia-subject-link__BO63O styles_lia-g-clamp__dg3Sg styles_lia-g-clamp-2__53ACH" data-testid="MessageLink" target="_self" aria-label="APM Configuration to Support Duo MFA using iRule" href="/kb/technicalarticles/apm-configuration-to-support-duo-mfa-using-irule/283971">APM Configuration to Support Duo MFA using iRule</a></h4><a class="MessageViewInline_lia-content__wPIos" data-testid="MessageLink" target="_self" tabindex="-1" aria-label="APM Configuration to Support Duo MFA using iRule" href="/kb/technicalarticles/apm-configuration-to-support-duo-mfa-using-irule/283971"><span class="styles_lia-g-message-body__LkV7_ styles_lia-g-message-body-tkb__SZmO_ styles_clearfix__xFEoC styles_lia-g-clamp__dg3Sg styles_lia-g-clamp-3__hQHtO MessageViewInline_lia-body__C9SCk MessageViewInline_lia-body-md__SERhT"> Overview BIG-IP APM has supported Duo as an MFA provider for a long time with RADIUS-based integration. Recently, Duo has added support for Universal Prompt that uses Open ID Connect (OIDC) protocol to provide two-factor authentication. To integrate APM as an OIDC client and resource server, and Duo as an Identity Provider (IdP), Duo requires the user’s logon name and custom parameters to be sent for Authentication and Token request. This guide describes the configuration required on APM to enable Duo MFA integration using an iRule. iRules addresses the custom parameter challenges by generating the needed custom values and saving them in session variables, which the OAuth Client agent then uses to perform MFA with Duo. This integration procedure is supported on BIG-IP versions 13.1, 14.1x, 15.1x, and 16.x. To integrate Duo MFA with APM, complete the following tasks: 1. Choose deployment type: Per-request or Per-session 2. Configure credentials and policies for MFA on the DUO web portal 3. Create OAuth objects on the BIG-IP system 4. Configure the iRule 5. Create the appropriate access policy/policies on the BIG-IP system 6. Apply policy/policies and iRule to the APM virtual server Choose deployment type APM supports two different types of policies for performing authentication functions. Per-session policies: Per-session policies provide authentication and authorization functions that occur only at the beginning of a user’s session. These policies are compatible with most APM use cases such as VPN, Webtop portal, Remote Desktop, federation IdP, etc. Per-request policies: Per-request policies provide dynamic authentication and authorization functionality that may occur at any time during a user’s session, such as step-up authentication or auditing functions only for certain resources. These policies are only compatible with Identity Aware Proxy and Web Access Management use cases and cannot be used with VPN or webtop portals. This guide contains information about setting up both policy types. Prerequisites Ensure the BIG-IP system has DNS and internet connectivity to contact Duo directly for validating the user's OAuth tokens. Configure credentials and policies for MFA on Duo web portal Before you can protect your F5 BIG-IP APM Web application with Duo, you will first need to sign up for a Duo account. 1. Log in to the Duo Admin Panel and navigate to Applications. 2. Click Protect an application. Figure 1: Duo Admin Panel – Protect an Application 3. Locate the entry for F5 BIG-IP APM Web in the applications list and click Protect to get the Client ID, Client secret, and API hostname. You will need this information to configure objects on APM. Figure 2: Duo Admin Panel – F5 BIG-IP APM Web 4. As DUO is used as a secondary authentication factor, the user’s logon name is sent along with the authentication request. Depending on your security policy, you may want to pre-provision users in Duo, or you may allow them to self-provision to set their preferred authentication type when they first log on. To add users to the Duo system, navigate to the Dashboard page and click the Add New... -&gt; Add User button. A Duo username should match the user's primary authentication username. Refer to the https://duo.com/docs/enrolling-users link for the different methods of user enrollment. Refer to Duo Universal Prompt for additional information on Duo’s two-factor authentication. Create OAuth objects on the BIG-IP system Create a JSON web key When APM is configured to act as an OAuth client or resource server, it uses JSON web keys (JWKs) to validate the JSON web tokens it receives from Duo. To create a JSON web key: 1. On the Main tab, select Access &gt; Federation &gt; JSON Web Token &gt; Key Configuration. The Key Configuration screen opens. 2. To add a new key configuration, click Create. 3. In the ID and Shared Secret fields, enter the Client ID and Client Secret values respectively obtained from Duo when protecting the application. 4. In the Type list, select the cryptographic algorithm used to sign the JSON web key. Figure 3: Key Configuration screen 5. Click Save. Create a JSON web token As an OAuth client or resource server, APM validates the JSON web tokens (JWT) it receives from Duo. To create a JSON web token: 1. On the Main tab, select Access &gt; Federation &gt; JSON Web Token &gt; Token Configuration. The Token Configuration screen opens. 2. To add a new token configuration, click Create. 3. In the Issuer field, enter the API hostname value obtained from Duo when protecting the application. 4. In the Signing Algorithms area, select from the Available list and populate the Allowed and Blocked lists. 5. In the Keys (JWK) area, select the previously configured JSON web key in the allowed list of keys. Figure 4: Token Configuration screen 6. Click Save. Configure Duo as an OAuth provider APM uses the OAuth provider settings to get URIs on the external OAuth authorization server for JWT web tokens. To configure an OAuth provider: 1. On the Main tab, select Access &gt; Federation &gt; OAuth Client / Resource Server &gt; Provider. The Provider screen opens. 2. To add a provider, click Create. 3. In the Name field, type a name for the provider. 4. From the Type list, select Custom. 5. For Token Configuration (JWT), select a configuration from the list. 6. In the Authentication URI field, type the URI on the provider where APM should redirect the user for authentication. The hostname is the same as the API hostname in the Duo application. 7. In the Token URI field, type the URI on the provider where APM can get a token. The hostname is the same as the API hostname in the Duo application. Figure 5: OAuth Provider screen 8. Click Finished. Configure Duo server for APM The OAuth Server settings specify the OAuth provider and role that Access Policy Manager (APM) plays with that provider. It also sets the Client ID, Client Secret, and Client’s SSL certificates that APM uses to communicate with the provider. To configure a Duo server: 1. On the Main tab, select Access &gt; Federation &gt; OAuth Client / Resource Server &gt; OAuth Server. The OAuth Server screen opens. 2. To add a server, click Create. 3. In the Name field, type a name for the Duo server. 4. From the Mode list, select how you want the APM to be configured. 5. From the Type list, select Custom. 6. From the OAuth Provider list, select the Duo provider. 7. From the DNS Resolver list, select a DNS resolver (or click the plus (+) icon, create a DNS resolver, and then select it). 8. In the Token Validation Interval field, type a number. In a per-request policy subroutine configured to validate the token, the subroutine repeats at this interval or the expiry time of the access token, whichever is shorter. 9. In the Client Settings area, paste the Client ID and Client secret you obtained from Duo when protecting the application. 10. From the Client's ServerSSL Profile Name, select a server SSL profile. Figure 6: OAuth Server screen 11. Click Finished. Configure an auth-redirect-request and a token-request Requests specify the HTTP method, parameters, and headers to use for the specific type of request. An auth-redirect-request tells Duo where to redirect the end-user, and a token-request accesses the authorization server for obtaining an access token. To configure an auth-redirect-request: 1. On the Main tab, select Access &gt; Federation &gt; OAuth Client / Resource Server &gt; Request. The Request screen opens. 2. To add a request, click Create. 3. In the Name field, type a name for the request. 4. For the HTTP Method, select GET. 5. For the Type, select auth-redirect-request. 6. As shown in Figure 7, specify the list of GET parameters to be sent: request parameter with value depending on the type of policy For per-request policy: %{subsession.custom.jwt_duo} For per-session policy: %{session.custom.jwt_duo} client_id parameter with type client-id response_type parameter with type response-type Figure 7: Request screen with auth-redirect-request (Use “subsession.custom…” for Per-request or “session.custom…” for Per-session) 7. Click Finished. To configure a token-request: 1. On the Main tab, select Access &gt; Federation &gt; OAuth Client / Resource Server &gt; Request. The Request screen opens. 2. To add a request, click Create. 3. In the Name field, type a name for the request. 4. For the HTTP Method, select POST. 5. For the Type, select token-request. 6. As shown in Figure 8, specify the list of POST parameters to be sent: client_assertion parameter with value depending on the type of policy For per-request policy: %{subsession.custom.jwt_duo_token} For per-session policy: %{session.custom.jwt_duo_token} client_assertion_type parameter with value urn:ietf:params:oauth:client-assertion-type:jwt-bearer grant_type parameter with type grant-type redirect_uri parameter with type redirect-uri Figure 8: Request screen with token-request (Use “subsession.custom…” for Per-request or “session.custom…” for Per-session) 7. Click Finished. Configure the iRule iRules gives you the ability to customize and manage your network traffic. Configure an iRule that creates the required sub-session variables and usernames for Duo integration. Note: This iRule has sections for both per-request and per-session policies and can be used for either type of deployment. To configure an iRule: 1. On the Main tab, click Local Traffic &gt; iRules. 2. To create an iRules, click Create. 3. In the Name field, type a name for the iRule. 4. Copy the sample code given below and paste it in the Definition field. Replace the following variables with values specific to the Duo application: &lt;Duo Client ID&gt; in the getClientId function with Duo Application ID. &lt;Duo API Hostname&gt; in the createJwtToken function with API Hostname. For example, https://api-duohostname.com/oauth/v1/token. &lt;JSON Web Key&gt; in the getJwkName function with the configured JSON web key. Note: The iRule ID here is set as JWT_CREATE. You can rename the ID as desired. You specify this ID in the iRule Event agent in Visual Policy Editor. Note: The variables used in the below example are global, which may affect your performance. Refer to the K95240202: Understanding iRule variable scope article for further information on global variables, and determine if you use a local variable for your implementation. when ACCESS_POLICY_AGENT_EVENT { if { [ACCESS::policy agent_id] eq "JWT_CREATE" } { set duo_uname [ACCESS::session data get "session.logon.last.username"] # Inline logic for creating JWT set header "{\"alg\":\"HS512\",\"typ\":\"JWT\"}" set exp [expr {[clock seconds] + 900}] set client_id "&lt;Duo Client ID&gt;" set redirect_uri "https://[ACCESS::session data get session.server.network.name]/oauth/client/redirect" set payload "{\"response_type\": \"code\",\"scope\":\"openid\",\"exp\":${exp},\"client_id\":\"${client_id}\",\"redirect_uri\":\"${redirect_uri}\",\"duo_uname\":\"${duo_uname}\"}" set jwt_duo [ACCESS::oauth sign -header $header -payload $payload -alg HS512 -key "&lt;JSON Web Key&gt;"] ACCESS::session data set session.custom.jwt_duo $jwt_duo # JWT Token creation set aud "&lt;Duo API Hostname&gt;" set jti [string range [clock seconds] 0 31] set token_payload "{\"sub\": \"${client_id}\",\"iss\":\"${client_id}\",\"aud\":\"${aud}\",\"exp\":${exp},\"jti\":\"${jti}\"}" set jwt_duo_token [ACCESS::oauth sign -header $header -payload $token_payload -alg HS512 -key "&lt;JSON Web Key&gt;"] ACCESS::session data set session.custom.jwt_duo_token $jwt_duo_token } } when ACCESS_PER_REQUEST_AGENT_EVENT { if { [ACCESS::perflow get perflow.irule_agent_id] eq "JWT_CREATE" } { set duo_uname [ACCESS::session data get "session.logon.last.username"] set header "{\"alg\":\"HS512\",\"typ\":\"JWT\"}" set exp [expr {[clock seconds] + 900}] set client_id "&lt;Duo Client ID&gt;" set redirect_uri "https://[ACCESS::session data get session.server.network.name]/oauth/client/redirect" set payload "{\"response_type\": \"code\",\"scope\":\"openid\",\"exp\":${exp},\"client_id\":\"${client_id}\",\"redirect_uri\":\"${redirect_uri}\",\"duo_uname\":\"${duo_uname}\"}" set jwt_duo [ACCESS::oauth sign -header $header -payload $payload -alg HS512 -key "&lt;JSON Web Key&gt;"] ACCESS::perflow set perflow.custom $jwt_duo # JWT Token creation set aud "&lt;Duo API Hostname&gt;" set jti [string range [clock seconds] 0 31] set token_payload "{\"sub\": \"${client_id}\",\"iss\":\"${client_id}\",\"aud\":\"${aud}\",\"exp\":${exp},\"jti\":\"${jti}\"}" set jwt_duo_token [ACCESS::oauth sign -header $header -payload $token_payload -alg HS512 -key "&lt;JSON Web Key&gt;"] ACCESS::perflow set perflow.scratchpad $jwt_duo_token } } Note: iRule updated 11/27/2024 to eliminate CMP demotion. Figure 9: iRule screen 5. Click Finished. Create the appropriate access policy/policies on the BIG-IP system Per-request policy Skip this section for a per-session type deployment The per-request policy is used to perform secondary authentication with Duo. Configure the access policies through the access menu, using the Visual Policy Editor. The per-request access policy must have a subroutine with an iRule Event, Variable Assign, and an OAuth Client agent that requests authorization and tokens from an OAuth server. You may use other per-request policy items such as URL branching or Client Type to call Duo only for certain target URIs. Figure 10 shows a subroutine named duosubroutine in the per-request policy that handles Duo MFA authentication. Figure 10: Per-request policy in Visual Policy Editor Configuring the iRule Event agent The iRule Event agent specifies the iRule ID to be executed for Duo integration. In the ID field, type the iRule ID as configured in the iRule. Figure 11: iRule Event agent in Visual Policy Editor Configuring the Variable Assign agent The Variable Assign agent specifies the variables for token and redirect requests and assigns a value for Duo MFA in a subroutine. This is required only for per-request type deployment. Add sub-session variables as custom variables and assign their custom Tcl expressions as shown in Figure 12. subsession.custom.jwt_duo_token = return [mcget {perflow.scratchpad}] subsession.custom.jwt_duo = return [mcget {perflow.custom}] Figure 12: Variable Assign agent in Visual Policy Editor Configuring the OAuth Client agent An OAuth Client agent requests authorization and tokens from the Duo server. Specify OAuth parameters as shown in Figure 13. In the Server list, select the Duo server to which the OAuth client directs requests. In the Authentication Redirect Request list, select the auth-redirect-request configured earlier. In the Token Request list, select the token-request configured earlier. Some deployments may not need the additional information provided by OpenID Connect. You could, in that case, disable it. Figure 13: OAuth Client agent in Visual Policy Editor Per-session policy Configure the Per Session policy as appropriate for your chosen deployment type. Per-request: The per-session policy must contain at least one logon page to set the username variable in the user’s session. Preferably it should also perform some type of primary authentication. This validated username is used later in the per-request policy. Per-session: The per-session policy is used for all authentication. A per-request policy is not used. Figures 14a and 14b show a per-session policy that runs when a client initiates a session. Depending on the actions you include in the access policy, it can authenticate the user and perform actions that populate session variables with data for use throughout the session. Figure 14a: Per-session policy in Visual Policy Editor performs both primary authentication and Duo authentication (for per-session use case) Figure 14b: Per-session policy in Visual Policy Editor performs primary authentication only (for per-request use case) Apply policy/policies and iRule to the APM virtual server Finally, apply the per-request policy, per-session policy, and iRule to the APM virtual server. You assign iRules as a resource to the virtual server that users connect. Configure the virtual server’s default pool to the protected local web resource. Apply policy/policies to the virtual server Per-request policy To attach policies to the virtual server: 1. On the Main tab, click Local Traffic &gt; Virtual Servers. 2. Select the Virtual Server. 3. In the Access Policy section, select the policy you created. 4. Click Finished. Figure 15: Access Policy section in Virtual Server (per-request policy) Per-session policy Figure 16 shows the Access Policy section in Virtual Server when the per-session policy is deployed. Figure 16: Access Policy section in Virtual Server (per-session policy) Apply iRule to the virtual server To attach the iRule to the virtual server: 1. On the Main tab, click Local Traffic &gt; Virtual Servers. 2. Select the Virtual Server. 3. Select the Resources tab. 4. Click Manage in the iRules section. 5. Select an iRule from the Available list and add it to the Enabled list. 6. Click Finished. </span><img src="https://community.f5.com/t5/s/zihoc95639/images/bS0yODM5NzEtMTE2MDdpMzQzRkI0NEVGQTdBMTBBNg?image-dimensions=300x400&amp;constrain-image=true" alt="0151T0000040JicQAE.png" data-testid="messagePreviewImage" crossorigin="use-credentials" class="MessageViewInline_lia-preview-img__v_cnb"/></a></div><div class="MessageViewInline_lia-footer__gNh52"><div class="MessageViewInline_lia-footer-section__99rW3 MessageViewInline_lia-footer-left__gAfgM"><div class="MessageViewInline_lia-byline__I93OZ MessageViewInline_lia-byline-md__VW8Gt"><div class="styles_lia-g-divider__X68T2 MessageViewInline_lia-author-info__8PVPG"><a data-hovercard-trigger="true" data-testid="userLink" class="MessageViewInline_lia-byline-item__kxYvN" aria-label="View Profile: Hardeep_Kaur" aria-describedby="UserHoverCard-214133" target="_self" href="/users/hardeep_kaur/214133">Hardeep_Kaur</a></div><a class="styles_lia-g-divider__X68T2 MessageViewInline_lia-byline-item__kxYvN" data-testid="MessageLink" target="_self" aria-label="2 days ago" href="/kb/technicalarticles/apm-configuration-to-support-duo-mfa-using-irule/283971?topicRepliesSort=postTimeDesc&amp;autoScroll=true"><span data-testid="messageTime"><span title="February 25, 2025 at 10:07 PM" role="none">Feb 25, 2025</span></span></a><a data-hovercard-trigger="true" data-testid="nodeLink" target="_self" class="styles_lia-g-divider__X68T2 MessageViewInline_lia-byline-item__kxYvN MessageViewInline_lia-node__eqyXY" aria-label="Go to parent Technical Articles" href="/category/articles/kb/technicalarticles"><svg class="styles_lia-g-icon-size-12__fO_66 Icon_lia-size-12__l8N3M Icon_lia-icon__on1Gb" data-testid="Icon" style="--lia-local-icon-color:var(--lia-tkb-color);--lia-local-icon-color-h:var(--lia-tkb-color-h);--lia-local-icon-color-s:var(--lia-tkb-color-s);--lia-local-icon-color-l:var(--lia-tkb-color-l)" aria-label="Content Type Knowledge Base icon"><use href="/static/graphics/processed/w78VdNAhVv9lCpAB5qCxSL66EsM/content-knowledge.svg#content-knowledge"></use></svg><span class="styles_sr-only__NOnjB styles_h-auto__SoSGz">Place Technical Articles</span><span aria-hidden="true">Technical Articles</span></a></div></div><div class="MessageViewInline_lia-footer-section__99rW3 MessageViewInline_lia-footer-right__mxWEA"><div class="styles_lia-g-count-wrap___e35P" data-testid="ViewCount"><svg class="styles_lia-g-icon-size-16__V9Va_ Icon_lia-size-16__D8_m2 Icon_lia-icon__on1Gb" data-testid="Icon" style="--lia-local-icon-color:var(--lia-bs-gray-600);--lia-local-icon-color-h:var(--lia-bs-gray-600-h);--lia-local-icon-color-s:var(--lia-bs-gray-600-s);--lia-local-icon-color-l:var(--lia-bs-gray-600-l)" aria-hidden="true"><use href="/static/graphics/processed/w78VdNAhVv9lCpAB5qCxSL66EsM/views.svg#views"></use></svg>18K<span class="styles_sr-only__NOnjB">Views</span></div><div class="styles_lia-g-count-wrap___e35P" data-testid="kudosCount"><svg class="styles_lia-g-icon-size-16__V9Va_ Icon_lia-size-16__D8_m2 Icon_lia-icon__on1Gb" data-testid="Icon" style="--lia-local-icon-color:var(--lia-bs-gray-600);--lia-local-icon-color-h:var(--lia-bs-gray-600-h);--lia-local-icon-color-s:var(--lia-bs-gray-600-s);--lia-local-icon-color-l:var(--lia-bs-gray-600-l)" aria-hidden="true"><use href="/static/graphics/processed/w78VdNAhVv9lCpAB5qCxSL66EsM/like.svg#like"></use></svg>11<span class="styles_sr-only__NOnjB">likes</span></div><div class="styles_lia-g-count-wrap___e35P" data-testid="messageRepliesCount"><svg class="styles_lia-g-icon-size-16__V9Va_ Icon_lia-size-16__D8_m2 Icon_lia-icon__on1Gb" data-testid="Icon" style="--lia-local-icon-color:var(--lia-bs-gray-600);--lia-local-icon-color-h:var(--lia-bs-gray-600-h);--lia-local-icon-color-s:var(--lia-bs-gray-600-s);--lia-local-icon-color-l:var(--lia-bs-gray-600-l)" aria-hidden="true"><use href="/static/graphics/processed/w78VdNAhVv9lCpAB5qCxSL66EsM/comment.svg#comment"></use></svg>52<span class="styles_sr-only__NOnjB">Comments</span></div></div></div></section></div></li><li class="PaneledItemList_lia-panel-list-item__bV87f styles_list-group-item__c_btC"><div class="MessageViewInline_lia-message__ALtxi" data-testid="InlineMessageView"><div class="MessageViewInline_lia-left-side__BLlQ_"><a data-hovercard-trigger="true" data-testid="userLink" class="styles_lia-g-mt-5__Gn6_v" aria-label="View Profile: alayne786" aria-describedby="UserHoverCard-426032" target="_self" href="/users/alayne786/426032"><span class="UserAvatar_lia-avatar__HFfcv styles_lia-g-icon-size-40__s3x_4" data-testid="userAvatar"><img src="https://community.f5.com/t5/s/zihoc95639/m_assets/avatars/default/avatar-6.svg?image-dimensions=40x40" alt="alayne786&#x27;s avatar" class="UserAvatar_lia-avatar-img__CUPwZ" aria-hidden="false" crossorigin="use-credentials"/></span></a></div><section class="MessageViewInline_lia-section__mP71c"><div class="MessageViewInline_lia-main__H_QLJ"><h4 title="SSL Renewal / Orchestration?" class="styles_text-break__Ny06M MessageViewInline_lia-subject__rxhY_" data-testid="MessageSubject"><a class="MessageViewInline_lia-subject-link__BO63O styles_lia-g-clamp__dg3Sg styles_lia-g-clamp-2__53ACH" data-testid="MessageLink" target="_self" aria-label="SSL Renewal / Orchestration?" href="/discussions/technicalforum/ssl-renewal--orchestration/340017">SSL Renewal / Orchestration?</a></h4><a class="MessageViewInline_lia-content__wPIos" data-testid="MessageLink" target="_self" tabindex="-1" aria-label="SSL Renewal / Orchestration?" href="/discussions/technicalforum/ssl-renewal--orchestration/340017"><span class="styles_lia-g-message-body__LkV7_ styles_lia-g-message-body-forum__p9J5_ styles_clearfix__xFEoC styles_lia-g-clamp__dg3Sg styles_lia-g-clamp-3__hQHtO MessageViewInline_lia-body__C9SCk MessageViewInline_lia-body-md__SERhT"> What are people who use F5 LTM using for SSL ordering/orchestration/renewal? We don't have BIGIP but are running BIGIP Os 16.x.x and I see some integration in the webUI for GOdady, Digicert., etc.. But we mostly use Globalsign / Globalsign API for cert ordering. I'm hoping to have an easy/secure way to renew/order/install certs to the F5 vCMP guests from Globalsign </span></a></div><div class="MessageViewInline_lia-footer__gNh52"><div class="MessageViewInline_lia-footer-section__99rW3 MessageViewInline_lia-footer-left__gAfgM"><div class="MessageViewInline_lia-byline__I93OZ MessageViewInline_lia-byline-md__VW8Gt"><div class="styles_lia-g-divider__X68T2 MessageViewInline_lia-author-info__8PVPG"><a data-hovercard-trigger="true" data-testid="userLink" class="MessageViewInline_lia-byline-item__kxYvN" aria-label="View Profile: alayne786" aria-describedby="UserHoverCard-426032" target="_self" href="/users/alayne786/426032">alayne786</a></div><a class="styles_lia-g-divider__X68T2 MessageViewInline_lia-byline-item__kxYvN" data-testid="MessageLink" target="_self" aria-label="2 days ago" href="/discussions/technicalforum/ssl-renewal--orchestration/340017?topicRepliesSort=postTimeDesc&amp;autoScroll=true"><span data-testid="messageTime"><span title="February 25, 2025 at 5:19 PM" role="none">Feb 25, 2025</span></span></a><a data-hovercard-trigger="true" data-testid="nodeLink" target="_self" class="styles_lia-g-divider__X68T2 MessageViewInline_lia-byline-item__kxYvN MessageViewInline_lia-node__eqyXY" aria-label="Go to parent Technical Forum" href="/category/forums/discussions/technicalforum"><svg class="styles_lia-g-icon-size-12__fO_66 Icon_lia-size-12__l8N3M Icon_lia-icon__on1Gb" data-testid="Icon" style="--lia-local-icon-color:var(--lia-forum-color);--lia-local-icon-color-h:var(--lia-forum-color-h);--lia-local-icon-color-s:var(--lia-forum-color-s);--lia-local-icon-color-l:var(--lia-forum-color-l)" aria-label="Content Type Forum icon"><use href="/static/graphics/processed/w78VdNAhVv9lCpAB5qCxSL66EsM/content-discussion.svg#content-discussion"></use></svg><span class="styles_sr-only__NOnjB styles_h-auto__SoSGz">Place Technical Forum</span><span aria-hidden="true">Technical Forum</span></a></div></div><div class="MessageViewInline_lia-footer-section__99rW3 MessageViewInline_lia-footer-right__mxWEA"><div class="styles_lia-g-count-wrap___e35P" data-testid="ViewCount"><svg class="styles_lia-g-icon-size-16__V9Va_ Icon_lia-size-16__D8_m2 Icon_lia-icon__on1Gb" data-testid="Icon" style="--lia-local-icon-color:var(--lia-bs-gray-600);--lia-local-icon-color-h:var(--lia-bs-gray-600-h);--lia-local-icon-color-s:var(--lia-bs-gray-600-s);--lia-local-icon-color-l:var(--lia-bs-gray-600-l)" aria-hidden="true"><use href="/static/graphics/processed/w78VdNAhVv9lCpAB5qCxSL66EsM/views.svg#views"></use></svg>24<span class="styles_sr-only__NOnjB">Views</span></div><div class="styles_lia-g-count-wrap___e35P" data-testid="kudosCount"><svg class="styles_lia-g-icon-size-16__V9Va_ Icon_lia-size-16__D8_m2 Icon_lia-icon__on1Gb" data-testid="Icon" style="--lia-local-icon-color:var(--lia-bs-gray-600);--lia-local-icon-color-h:var(--lia-bs-gray-600-h);--lia-local-icon-color-s:var(--lia-bs-gray-600-s);--lia-local-icon-color-l:var(--lia-bs-gray-600-l)" aria-hidden="true"><use href="/static/graphics/processed/w78VdNAhVv9lCpAB5qCxSL66EsM/like.svg#like"></use></svg>0<span class="styles_sr-only__NOnjB">likes</span></div><div class="styles_lia-g-count-wrap___e35P" data-testid="messageRepliesCount"><svg class="styles_lia-g-icon-size-16__V9Va_ Icon_lia-size-16__D8_m2 Icon_lia-icon__on1Gb" data-testid="Icon" style="--lia-local-icon-color:var(--lia-bs-gray-600);--lia-local-icon-color-h:var(--lia-bs-gray-600-h);--lia-local-icon-color-s:var(--lia-bs-gray-600-s);--lia-local-icon-color-l:var(--lia-bs-gray-600-l)" aria-hidden="true"><use href="/static/graphics/processed/w78VdNAhVv9lCpAB5qCxSL66EsM/comment.svg#comment"></use></svg>2<span class="styles_sr-only__NOnjB">Comments</span></div></div></div></section></div></li><li class="PaneledItemList_lia-panel-list-item__bV87f styles_list-group-item__c_btC"><div class="MessageViewInline_lia-message__ALtxi" data-testid="InlineMessageView"><div class="MessageViewInline_lia-left-side__BLlQ_"><a data-hovercard-trigger="true" data-testid="userLink" class="styles_lia-g-mt-5__Gn6_v" aria-label="View Profile: thekoreanguy" aria-describedby="UserHoverCard-426073" target="_self" href="/users/thekoreanguy/426073"><span class="UserAvatar_lia-avatar__HFfcv styles_lia-g-icon-size-40__s3x_4" data-testid="userAvatar"><img src="https://community.f5.com/t5/s/zihoc95639/m_assets/avatars/default/avatar-3.svg?image-dimensions=40x40" alt="thekoreanguy&#x27;s avatar" class="UserAvatar_lia-avatar-img__CUPwZ" aria-hidden="false" crossorigin="use-credentials"/></span></a></div><section class="MessageViewInline_lia-section__mP71c"><div class="MessageViewInline_lia-main__H_QLJ"><h4 title="configure blocking response page" class="styles_text-break__Ny06M MessageViewInline_lia-subject__rxhY_" data-testid="MessageSubject"><a class="MessageViewInline_lia-subject-link__BO63O styles_lia-g-clamp__dg3Sg styles_lia-g-clamp-2__53ACH" data-testid="MessageLink" target="_self" aria-label="configure blocking response page" href="/discussions/technicalforum/configure-blocking-response-page/339885">configure blocking response page</a></h4><a class="MessageViewInline_lia-content__wPIos" data-testid="MessageLink" target="_self" tabindex="-1" aria-label="configure blocking response page" href="/discussions/technicalforum/configure-blocking-response-page/339885"><span class="styles_lia-g-message-body__LkV7_ styles_lia-g-message-body-forum__p9J5_ styles_clearfix__xFEoC styles_lia-g-clamp__dg3Sg styles_lia-g-clamp-3__hQHtO MessageViewInline_lia-body__C9SCk MessageViewInline_lia-body-md__SERhT"> Hi, I want to modify the blocking response page. "Your support ID is: &lt;%TS.request.ID()%&gt;" As follows, I would like to modify the &lt;%TS.request.ID()&gt; part to output something like attack signature or detected keyword. How can I find that TS variable?? </span><img src="https://community.f5.com/t5/s/zihoc95639/images/bS0zMzk4ODUtYmJKZG1N?image-dimensions=300x400&amp;constrain-image=true" alt="" data-testid="messagePreviewImage" crossorigin="use-credentials" class="MessageViewInline_lia-preview-img__v_cnb"/></a></div><div class="MessageViewInline_lia-footer__gNh52"><div class="MessageViewInline_lia-footer-section__99rW3 MessageViewInline_lia-footer-left__gAfgM"><div class="MessageViewInline_lia-byline__I93OZ MessageViewInline_lia-byline-md__VW8Gt"><div class="styles_lia-g-divider__X68T2 MessageViewInline_lia-author-info__8PVPG"><a data-hovercard-trigger="true" data-testid="userLink" class="MessageViewInline_lia-byline-item__kxYvN" aria-label="View Profile: thekoreanguy" aria-describedby="UserHoverCard-426073" target="_self" href="/users/thekoreanguy/426073">thekoreanguy</a></div><a class="styles_lia-g-divider__X68T2 MessageViewInline_lia-byline-item__kxYvN" data-testid="MessageLink" target="_self" aria-label="2 days ago" href="/discussions/technicalforum/configure-blocking-response-page/339885?topicRepliesSort=postTimeDesc&amp;autoScroll=true"><span data-testid="messageTime"><span title="February 25, 2025 at 4:20 PM" role="none">Feb 25, 2025</span></span></a><a data-hovercard-trigger="true" data-testid="nodeLink" target="_self" class="styles_lia-g-divider__X68T2 MessageViewInline_lia-byline-item__kxYvN MessageViewInline_lia-node__eqyXY" aria-label="Go to parent Technical Forum" href="/category/forums/discussions/technicalforum"><svg class="styles_lia-g-icon-size-12__fO_66 Icon_lia-size-12__l8N3M Icon_lia-icon__on1Gb" data-testid="Icon" style="--lia-local-icon-color:var(--lia-forum-color);--lia-local-icon-color-h:var(--lia-forum-color-h);--lia-local-icon-color-s:var(--lia-forum-color-s);--lia-local-icon-color-l:var(--lia-forum-color-l)" aria-label="Content Type Forum icon"><use href="/static/graphics/processed/w78VdNAhVv9lCpAB5qCxSL66EsM/content-discussion.svg#content-discussion"></use></svg><span class="styles_sr-only__NOnjB styles_h-auto__SoSGz">Place Technical Forum</span><span aria-hidden="true">Technical Forum</span></a></div></div><div class="MessageViewInline_lia-footer-section__99rW3 MessageViewInline_lia-footer-right__mxWEA"><div class="styles_lia-g-count-wrap___e35P" data-testid="ViewCount"><svg class="styles_lia-g-icon-size-16__V9Va_ Icon_lia-size-16__D8_m2 Icon_lia-icon__on1Gb" data-testid="Icon" style="--lia-local-icon-color:var(--lia-bs-gray-600);--lia-local-icon-color-h:var(--lia-bs-gray-600-h);--lia-local-icon-color-s:var(--lia-bs-gray-600-s);--lia-local-icon-color-l:var(--lia-bs-gray-600-l)" aria-hidden="true"><use href="/static/graphics/processed/w78VdNAhVv9lCpAB5qCxSL66EsM/views.svg#views"></use></svg>44<span class="styles_sr-only__NOnjB">Views</span></div><div class="styles_lia-g-count-wrap___e35P" data-testid="kudosCount"><svg class="styles_lia-g-icon-size-16__V9Va_ Icon_lia-size-16__D8_m2 Icon_lia-icon__on1Gb" data-testid="Icon" style="--lia-local-icon-color:var(--lia-bs-gray-600);--lia-local-icon-color-h:var(--lia-bs-gray-600-h);--lia-local-icon-color-s:var(--lia-bs-gray-600-s);--lia-local-icon-color-l:var(--lia-bs-gray-600-l)" aria-hidden="true"><use href="/static/graphics/processed/w78VdNAhVv9lCpAB5qCxSL66EsM/like.svg#like"></use></svg>0<span class="styles_sr-only__NOnjB">likes</span></div><div class="styles_lia-g-count-wrap___e35P" data-testid="messageRepliesCount"><svg class="styles_lia-g-icon-size-16__V9Va_ Icon_lia-size-16__D8_m2 Icon_lia-icon__on1Gb" data-testid="Icon" style="--lia-local-icon-color:var(--lia-bs-gray-600);--lia-local-icon-color-h:var(--lia-bs-gray-600-h);--lia-local-icon-color-s:var(--lia-bs-gray-600-s);--lia-local-icon-color-l:var(--lia-bs-gray-600-l)" aria-hidden="true"><use href="/static/graphics/processed/w78VdNAhVv9lCpAB5qCxSL66EsM/comment.svg#comment"></use></svg>2<span class="styles_sr-only__NOnjB">Comments</span></div></div></div></section></div></li><li class="PaneledItemList_lia-panel-list-item__bV87f styles_list-group-item__c_btC"><div class="MessageViewInline_lia-message__ALtxi" data-testid="InlineMessageView"><div class="MessageViewInline_lia-left-side__BLlQ_"><a data-hovercard-trigger="true" data-testid="userLink" class="styles_lia-g-mt-5__Gn6_v" aria-label="View Profile: david_barrosvegas" aria-describedby="UserHoverCard-423977" target="_self" href="/users/david_barrosvegas/423977"><span class="UserAvatar_lia-avatar__HFfcv styles_lia-g-icon-size-40__s3x_4" data-testid="userAvatar"><img src="https://community.f5.com/t5/s/zihoc95639/m_assets/avatars/default/avatar-7.svg?image-dimensions=40x40" alt="david_barrosvegas&#x27;s avatar" class="UserAvatar_lia-avatar-img__CUPwZ" aria-hidden="false" crossorigin="use-credentials"/></span></a></div><section class="MessageViewInline_lia-section__mP71c"><div class="MessageViewInline_lia-main__H_QLJ MessageViewInline_lia-with-meta__Z4OLF"><h4 title="Unknown (Enabled) - Node address service checking is enabled, but result is not available yet" class="styles_text-break__Ny06M MessageViewInline_lia-subject__rxhY_" data-testid="MessageSubject"><a class="MessageViewInline_lia-subject-link__BO63O styles_lia-g-clamp__dg3Sg styles_lia-g-clamp-2__53ACH" data-testid="MessageLink" target="_self" aria-label="Unknown (Enabled) - Node address service checking is enabled, but result is not available yet" href="/discussions/technicalforum/unknown-enabled---node-address-service-checking-is-enabled-but-result-is-not-ava/316752">Unknown (Enabled) - Node address service checking is enabled, but result is not available yet</a></h4><a class="MessageViewInline_lia-content__wPIos" data-testid="MessageLink" target="_self" tabindex="-1" aria-label="Unknown (Enabled) - Node address service checking is enabled, but result is not available yet" href="/discussions/technicalforum/unknown-enabled---node-address-service-checking-is-enabled-but-result-is-not-ava/316752"><span class="styles_lia-g-message-body__LkV7_ styles_lia-g-message-body-forum__p9J5_ styles_clearfix__xFEoC styles_lia-g-clamp__dg3Sg styles_lia-g-clamp-3__hQHtO MessageViewInline_lia-body__C9SCk MessageViewInline_lia-body-md__SERhT"> Hi team good day could someone help me, I'm trying to configure the device (F5), but when I add the nodes I get the following message: "Unknown (Enabled) - Node address service checking is enabled, but result is not available yet" The thing is that when I access via cli (ssh) and execute a telnet to the port it is successful, but the service is in a blue state. I send screenshots of the error: Could you help me please, it's the first time I've configured it, thank you: successful connection telnet to port 7500 via cli (ssh): echo "" | nc -v -w 1 10.154.104.6 7500 Ncat: Version 6.40 ( http://nmap.org/ncat ) Ncat: Connected to 10.154.104.6:7500. &lt;{25:20230612144900;27:99;31:1;26:Error;28:Format Error;32:1}Ncat: 1 bytes sent, 66 bytes received in 0.02 seconds. [neteng@F5-AR-HO-LB-1:ForcedOffline:Standalone] ~ # </span></a><div class="MessageViewInline_lia-meta__lmi01"><span data-testid="messageSolvedBadge" class="MessageSolvedBadge_lia-solved-badge__BBnd1 styles_d-flex__7__Y_ styles_flex-row__JMdBm MessageViewInline_lia-solved-badge__8yipv styles_badge__ReL9K styles_badge-pill__YFx73"><svg class="MessageSolvedBadge_lia-solved-icon__vPi6y styles_lia-g-icon-size-12__fO_66 Icon_lia-size-12__l8N3M Icon_lia-icon__on1Gb" data-testid="Icon" style="--lia-local-icon-color:var(--lia-forum-solved-color);--lia-local-icon-color-h:var(--lia-forum-solved-color-h);--lia-local-icon-color-s:var(--lia-forum-solved-color-s);--lia-local-icon-color-l:var(--lia-forum-solved-color-l)" aria-hidden="true"><use href="/static/graphics/processed/w78VdNAhVv9lCpAB5qCxSL66EsM/checkmark.svg#checkmark"></use></svg>Solved</span></div></div><div class="MessageViewInline_lia-footer__gNh52"><div class="MessageViewInline_lia-footer-section__99rW3 MessageViewInline_lia-footer-left__gAfgM"><div class="MessageViewInline_lia-byline__I93OZ MessageViewInline_lia-byline-md__VW8Gt"><div class="styles_lia-g-divider__X68T2 MessageViewInline_lia-author-info__8PVPG"><a data-hovercard-trigger="true" data-testid="userLink" class="MessageViewInline_lia-byline-item__kxYvN" aria-label="View Profile: david_barrosvegas" aria-describedby="UserHoverCard-423977" target="_self" href="/users/david_barrosvegas/423977">david_barrosvegas</a></div><a class="styles_lia-g-divider__X68T2 MessageViewInline_lia-byline-item__kxYvN" data-testid="MessageLink" target="_self" aria-label="2 days ago" href="/discussions/technicalforum/unknown-enabled---node-address-service-checking-is-enabled-but-result-is-not-ava/316752?topicRepliesSort=postTimeDesc&amp;autoScroll=true"><span data-testid="messageTime"><span title="February 25, 2025 at 3:42 PM" role="none">Feb 25, 2025</span></span></a><a data-hovercard-trigger="true" data-testid="nodeLink" target="_self" class="styles_lia-g-divider__X68T2 MessageViewInline_lia-byline-item__kxYvN MessageViewInline_lia-node__eqyXY" aria-label="Go to parent Technical Forum" href="/category/forums/discussions/technicalforum"><svg class="styles_lia-g-icon-size-12__fO_66 Icon_lia-size-12__l8N3M Icon_lia-icon__on1Gb" data-testid="Icon" style="--lia-local-icon-color:var(--lia-forum-color);--lia-local-icon-color-h:var(--lia-forum-color-h);--lia-local-icon-color-s:var(--lia-forum-color-s);--lia-local-icon-color-l:var(--lia-forum-color-l)" aria-label="Content Type Forum icon"><use href="/static/graphics/processed/w78VdNAhVv9lCpAB5qCxSL66EsM/content-discussion.svg#content-discussion"></use></svg><span class="styles_sr-only__NOnjB styles_h-auto__SoSGz">Place Technical Forum</span><span aria-hidden="true">Technical Forum</span></a></div></div><div class="MessageViewInline_lia-footer-section__99rW3 MessageViewInline_lia-footer-right__mxWEA"><div class="styles_lia-g-count-wrap___e35P" data-testid="ViewCount"><svg class="styles_lia-g-icon-size-16__V9Va_ Icon_lia-size-16__D8_m2 Icon_lia-icon__on1Gb" data-testid="Icon" style="--lia-local-icon-color:var(--lia-bs-gray-600);--lia-local-icon-color-h:var(--lia-bs-gray-600-h);--lia-local-icon-color-s:var(--lia-bs-gray-600-s);--lia-local-icon-color-l:var(--lia-bs-gray-600-l)" aria-hidden="true"><use href="/static/graphics/processed/w78VdNAhVv9lCpAB5qCxSL66EsM/views.svg#views"></use></svg>2.3K<span class="styles_sr-only__NOnjB">Views</span></div><div class="styles_lia-g-count-wrap___e35P" data-testid="kudosCount"><svg class="styles_lia-g-icon-size-16__V9Va_ Icon_lia-size-16__D8_m2 Icon_lia-icon__on1Gb" data-testid="Icon" style="--lia-local-icon-color:var(--lia-bs-gray-600);--lia-local-icon-color-h:var(--lia-bs-gray-600-h);--lia-local-icon-color-s:var(--lia-bs-gray-600-s);--lia-local-icon-color-l:var(--lia-bs-gray-600-l)" aria-hidden="true"><use href="/static/graphics/processed/w78VdNAhVv9lCpAB5qCxSL66EsM/like.svg#like"></use></svg>0<span class="styles_sr-only__NOnjB">likes</span></div><div class="styles_lia-g-count-wrap___e35P" data-testid="messageRepliesCount"><svg class="styles_lia-g-icon-size-16__V9Va_ Icon_lia-size-16__D8_m2 Icon_lia-icon__on1Gb" data-testid="Icon" style="--lia-local-icon-color:var(--lia-bs-gray-600);--lia-local-icon-color-h:var(--lia-bs-gray-600-h);--lia-local-icon-color-s:var(--lia-bs-gray-600-s);--lia-local-icon-color-l:var(--lia-bs-gray-600-l)" aria-hidden="true"><use href="/static/graphics/processed/w78VdNAhVv9lCpAB5qCxSL66EsM/comment.svg#comment"></use></svg>3<span class="styles_sr-only__NOnjB">Comments</span></div></div></div></section></div></li><li class="PaneledItemList_lia-panel-list-item__bV87f styles_list-group-item__c_btC"><div class="MessageViewInline_lia-message__ALtxi" data-testid="InlineMessageView"><div class="MessageViewInline_lia-left-side__BLlQ_"><a data-hovercard-trigger="true" data-testid="userLink" class="styles_lia-g-mt-5__Gn6_v" aria-label="View Profile: THE_BLUE" aria-describedby="UserHoverCard-259586" target="_self" href="/users/the_blue/259586"><span class="UserAvatar_lia-avatar__HFfcv styles_lia-g-icon-size-40__s3x_4" data-testid="userAvatar"><img src="https://community.f5.com/t5/s/zihoc95639/m_assets/avatars/default/avatar-10.svg?image-dimensions=40x40" alt="THE_BLUE&#x27;s avatar" class="UserAvatar_lia-avatar-img__CUPwZ" aria-hidden="false" crossorigin="use-credentials"/></span></a></div><section class="MessageViewInline_lia-section__mP71c"><div class="MessageViewInline_lia-main__H_QLJ MessageViewInline_lia-with-meta__Z4OLF"><h4 title="VS STATISTICS" class="styles_text-break__Ny06M MessageViewInline_lia-subject__rxhY_" data-testid="MessageSubject"><a class="MessageViewInline_lia-subject-link__BO63O styles_lia-g-clamp__dg3Sg styles_lia-g-clamp-2__53ACH" data-testid="MessageLink" target="_self" aria-label="VS STATISTICS" href="/discussions/technicalforum/vs-statistics/339684">VS STATISTICS</a></h4><a class="MessageViewInline_lia-content__wPIos" data-testid="MessageLink" target="_self" tabindex="-1" aria-label="VS STATISTICS" href="/discussions/technicalforum/vs-statistics/339684"><span class="styles_lia-g-message-body__LkV7_ styles_lia-g-message-body-forum__p9J5_ styles_clearfix__xFEoC styles_lia-g-clamp__dg3Sg styles_lia-g-clamp-3__hQHtO MessageViewInline_lia-body__C9SCk MessageViewInline_lia-body-md__SERhT"> I want to know the statistics of a specific virtual server (VS) in BIG-IP. I ran the command below and received the result. My question is: are these details real-time or for a specific period? tmsh show /ltm virtual /Common/vs_name </span></a><div class="MessageViewInline_lia-meta__lmi01"><span data-testid="messageSolvedBadge" class="MessageSolvedBadge_lia-solved-badge__BBnd1 styles_d-flex__7__Y_ styles_flex-row__JMdBm MessageViewInline_lia-solved-badge__8yipv styles_badge__ReL9K styles_badge-pill__YFx73"><svg class="MessageSolvedBadge_lia-solved-icon__vPi6y styles_lia-g-icon-size-12__fO_66 Icon_lia-size-12__l8N3M Icon_lia-icon__on1Gb" data-testid="Icon" style="--lia-local-icon-color:var(--lia-forum-solved-color);--lia-local-icon-color-h:var(--lia-forum-solved-color-h);--lia-local-icon-color-s:var(--lia-forum-solved-color-s);--lia-local-icon-color-l:var(--lia-forum-solved-color-l)" aria-hidden="true"><use href="/static/graphics/processed/w78VdNAhVv9lCpAB5qCxSL66EsM/checkmark.svg#checkmark"></use></svg>Solved</span></div></div><div class="MessageViewInline_lia-footer__gNh52"><div class="MessageViewInline_lia-footer-section__99rW3 MessageViewInline_lia-footer-left__gAfgM"><div class="MessageViewInline_lia-byline__I93OZ MessageViewInline_lia-byline-md__VW8Gt"><div class="styles_lia-g-divider__X68T2 MessageViewInline_lia-author-info__8PVPG"><a data-hovercard-trigger="true" data-testid="userLink" class="MessageViewInline_lia-byline-item__kxYvN" aria-label="View Profile: THE_BLUE" aria-describedby="UserHoverCard-259586" target="_self" href="/users/the_blue/259586">THE_BLUE</a></div><a class="styles_lia-g-divider__X68T2 MessageViewInline_lia-byline-item__kxYvN" data-testid="MessageLink" target="_self" aria-label="2 days ago" href="/discussions/technicalforum/vs-statistics/339684?topicRepliesSort=postTimeDesc&amp;autoScroll=true"><span data-testid="messageTime"><span title="February 25, 2025 at 12:45 PM" role="none">Feb 25, 2025</span></span></a><a data-hovercard-trigger="true" data-testid="nodeLink" target="_self" class="styles_lia-g-divider__X68T2 MessageViewInline_lia-byline-item__kxYvN MessageViewInline_lia-node__eqyXY" aria-label="Go to parent Technical Forum" href="/category/forums/discussions/technicalforum"><svg class="styles_lia-g-icon-size-12__fO_66 Icon_lia-size-12__l8N3M Icon_lia-icon__on1Gb" data-testid="Icon" style="--lia-local-icon-color:var(--lia-forum-color);--lia-local-icon-color-h:var(--lia-forum-color-h);--lia-local-icon-color-s:var(--lia-forum-color-s);--lia-local-icon-color-l:var(--lia-forum-color-l)" aria-label="Content Type Forum icon"><use href="/static/graphics/processed/w78VdNAhVv9lCpAB5qCxSL66EsM/content-discussion.svg#content-discussion"></use></svg><span class="styles_sr-only__NOnjB styles_h-auto__SoSGz">Place Technical Forum</span><span aria-hidden="true">Technical Forum</span></a></div></div><div class="MessageViewInline_lia-footer-section__99rW3 MessageViewInline_lia-footer-right__mxWEA"><div class="styles_lia-g-count-wrap___e35P" data-testid="ViewCount"><svg class="styles_lia-g-icon-size-16__V9Va_ Icon_lia-size-16__D8_m2 Icon_lia-icon__on1Gb" data-testid="Icon" style="--lia-local-icon-color:var(--lia-bs-gray-600);--lia-local-icon-color-h:var(--lia-bs-gray-600-h);--lia-local-icon-color-s:var(--lia-bs-gray-600-s);--lia-local-icon-color-l:var(--lia-bs-gray-600-l)" aria-hidden="true"><use href="/static/graphics/processed/w78VdNAhVv9lCpAB5qCxSL66EsM/views.svg#views"></use></svg>107<span class="styles_sr-only__NOnjB">Views</span></div><div class="styles_lia-g-count-wrap___e35P" data-testid="kudosCount"><svg class="styles_lia-g-icon-size-16__V9Va_ Icon_lia-size-16__D8_m2 Icon_lia-icon__on1Gb" data-testid="Icon" style="--lia-local-icon-color:var(--lia-bs-gray-600);--lia-local-icon-color-h:var(--lia-bs-gray-600-h);--lia-local-icon-color-s:var(--lia-bs-gray-600-s);--lia-local-icon-color-l:var(--lia-bs-gray-600-l)" aria-hidden="true"><use href="/static/graphics/processed/w78VdNAhVv9lCpAB5qCxSL66EsM/like.svg#like"></use></svg>0<span class="styles_sr-only__NOnjB">likes</span></div><div class="styles_lia-g-count-wrap___e35P" data-testid="messageRepliesCount"><svg class="styles_lia-g-icon-size-16__V9Va_ Icon_lia-size-16__D8_m2 Icon_lia-icon__on1Gb" data-testid="Icon" style="--lia-local-icon-color:var(--lia-bs-gray-600);--lia-local-icon-color-h:var(--lia-bs-gray-600-h);--lia-local-icon-color-s:var(--lia-bs-gray-600-s);--lia-local-icon-color-l:var(--lia-bs-gray-600-l)" aria-hidden="true"><use href="/static/graphics/processed/w78VdNAhVv9lCpAB5qCxSL66EsM/comment.svg#comment"></use></svg>10<span class="styles_sr-only__NOnjB">Comments</span></div></div></div></section></div></li><li class="PaneledItemList_lia-panel-list-item__bV87f styles_list-group-item__c_btC"><div class="MessageViewInline_lia-message__ALtxi" data-testid="InlineMessageView"><div class="MessageViewInline_lia-left-side__BLlQ_"><a data-hovercard-trigger="true" data-testid="userLink" class="styles_lia-g-mt-5__Gn6_v" aria-label="View Profile: Russell_Moore" aria-describedby="UserHoverCard-418945" target="_self" href="/users/russell_moore/418945"><span class="UserAvatar_lia-avatar__HFfcv styles_lia-g-icon-size-40__s3x_4" data-testid="userAvatar"><img src="https://community.f5.com/t5/s/zihoc95639/images/dS00MTg5NDUtMjA0MzBpN0VCMjcyMjZCMEQxMkZEQg?image-dimensions=40x40" alt="Russell_Moore&#x27;s avatar" class="UserAvatar_lia-avatar-img__CUPwZ" aria-hidden="false" crossorigin="use-credentials"/></span></a></div><section class="MessageViewInline_lia-section__mP71c"><div class="MessageViewInline_lia-main__H_QLJ"><h4 title="F5 BIG-IP Access Policy Manager (APM) Machine Tunnels for Windows" class="styles_text-break__Ny06M MessageViewInline_lia-subject__rxhY_" data-testid="MessageSubject"><a class="MessageViewInline_lia-subject-link__BO63O styles_lia-g-clamp__dg3Sg styles_lia-g-clamp-2__53ACH" data-testid="MessageLink" target="_self" aria-label="F5 BIG-IP Access Policy Manager (APM) Machine Tunnels for Windows" href="/kb/technicalarticles/f5-big-ip-access-policy-manager-apm-machine-tunnels-for-windows/310896">F5 BIG-IP Access Policy Manager (APM) Machine Tunnels for Windows</a></h4><a class="MessageViewInline_lia-content__wPIos" data-testid="MessageLink" target="_self" tabindex="-1" aria-label="F5 BIG-IP Access Policy Manager (APM) Machine Tunnels for Windows" href="/kb/technicalarticles/f5-big-ip-access-policy-manager-apm-machine-tunnels-for-windows/310896"><span data-testid="MessageTeaser" class="MessageViewInline_lia-body__C9SCk MessageViewInline_lia-body-md__SERhT styles_lia-g-clamp__dg3Sg styles_lia-g-clamp-3__hQHtO"> Would you like for your windows clients to call home securely? Don't leave client machines out in the cold. F5 APM with Machine Tunnels can keep your clients up-to-date and in sync. </span><img src="https://community.f5.com/t5/s/zihoc95639/images/bS0zMTA4OTYtMjIxOThpNzA3MzI2QTg3Qjg3Qzg3Mg?image-dimensions=300x400&amp;constrain-image=true" alt="" data-testid="messagePreviewImage" crossorigin="use-credentials" class="MessageViewInline_lia-preview-img__v_cnb"/></a></div><div class="MessageViewInline_lia-footer__gNh52"><div class="MessageViewInline_lia-footer-section__99rW3 MessageViewInline_lia-footer-left__gAfgM"><div class="MessageViewInline_lia-byline__I93OZ MessageViewInline_lia-byline-md__VW8Gt"><div class="styles_lia-g-divider__X68T2 MessageViewInline_lia-author-info__8PVPG"><a data-hovercard-trigger="true" data-testid="userLink" class="MessageViewInline_lia-byline-item__kxYvN" aria-label="View Profile: Russell_Moore" aria-describedby="UserHoverCard-418945" target="_self" href="/users/russell_moore/418945">Russell_Moore</a></div><a class="styles_lia-g-divider__X68T2 MessageViewInline_lia-byline-item__kxYvN" data-testid="MessageLink" target="_self" aria-label="2 days ago" href="/kb/technicalarticles/f5-big-ip-access-policy-manager-apm-machine-tunnels-for-windows/310896?topicRepliesSort=postTimeDesc&amp;autoScroll=true"><span data-testid="messageTime"><span title="February 25, 2025 at 8:14 AM" role="none">Feb 25, 2025</span></span></a><a data-hovercard-trigger="true" data-testid="nodeLink" target="_self" class="styles_lia-g-divider__X68T2 MessageViewInline_lia-byline-item__kxYvN MessageViewInline_lia-node__eqyXY" aria-label="Go to parent Technical Articles" href="/category/articles/kb/technicalarticles"><svg class="styles_lia-g-icon-size-12__fO_66 Icon_lia-size-12__l8N3M Icon_lia-icon__on1Gb" data-testid="Icon" style="--lia-local-icon-color:var(--lia-tkb-color);--lia-local-icon-color-h:var(--lia-tkb-color-h);--lia-local-icon-color-s:var(--lia-tkb-color-s);--lia-local-icon-color-l:var(--lia-tkb-color-l)" aria-label="Content Type Knowledge Base icon"><use href="/static/graphics/processed/w78VdNAhVv9lCpAB5qCxSL66EsM/content-knowledge.svg#content-knowledge"></use></svg><span class="styles_sr-only__NOnjB styles_h-auto__SoSGz">Place Technical Articles</span><span aria-hidden="true">Technical Articles</span></a></div></div><div class="MessageViewInline_lia-footer-section__99rW3 MessageViewInline_lia-footer-right__mxWEA"><div class="styles_lia-g-count-wrap___e35P" data-testid="ViewCount"><svg class="styles_lia-g-icon-size-16__V9Va_ Icon_lia-size-16__D8_m2 Icon_lia-icon__on1Gb" data-testid="Icon" style="--lia-local-icon-color:var(--lia-bs-gray-600);--lia-local-icon-color-h:var(--lia-bs-gray-600-h);--lia-local-icon-color-s:var(--lia-bs-gray-600-s);--lia-local-icon-color-l:var(--lia-bs-gray-600-l)" aria-hidden="true"><use href="/static/graphics/processed/w78VdNAhVv9lCpAB5qCxSL66EsM/views.svg#views"></use></svg>5.3K<span class="styles_sr-only__NOnjB">Views</span></div><div class="styles_lia-g-count-wrap___e35P" data-testid="kudosCount"><svg class="styles_lia-g-icon-size-16__V9Va_ Icon_lia-size-16__D8_m2 Icon_lia-icon__on1Gb" data-testid="Icon" style="--lia-local-icon-color:var(--lia-bs-gray-600);--lia-local-icon-color-h:var(--lia-bs-gray-600-h);--lia-local-icon-color-s:var(--lia-bs-gray-600-s);--lia-local-icon-color-l:var(--lia-bs-gray-600-l)" aria-hidden="true"><use href="/static/graphics/processed/w78VdNAhVv9lCpAB5qCxSL66EsM/like.svg#like"></use></svg>5<span class="styles_sr-only__NOnjB">likes</span></div><div class="styles_lia-g-count-wrap___e35P" data-testid="messageRepliesCount"><svg class="styles_lia-g-icon-size-16__V9Va_ Icon_lia-size-16__D8_m2 Icon_lia-icon__on1Gb" data-testid="Icon" style="--lia-local-icon-color:var(--lia-bs-gray-600);--lia-local-icon-color-h:var(--lia-bs-gray-600-h);--lia-local-icon-color-s:var(--lia-bs-gray-600-s);--lia-local-icon-color-l:var(--lia-bs-gray-600-l)" aria-hidden="true"><use href="/static/graphics/processed/w78VdNAhVv9lCpAB5qCxSL66EsM/comment.svg#comment"></use></svg>1<span class="styles_sr-only__NOnjB">Comment</span></div></div></div></section></div></li><li class="PaneledItemList_lia-panel-list-item__bV87f styles_list-group-item__c_btC"><div class="MessageViewInline_lia-message__ALtxi" data-testid="InlineMessageView"><div class="MessageViewInline_lia-left-side__BLlQ_"><a data-hovercard-trigger="true" data-testid="userLink" class="styles_lia-g-mt-5__Gn6_v" aria-label="View Profile: Jennifer_Yeung" aria-describedby="UserHoverCard-421692" target="_self" href="/users/jennifer_yeung/421692"><span class="UserAvatar_lia-avatar__HFfcv styles_lia-g-icon-size-40__s3x_4" data-testid="userAvatar"><img src="https://community.f5.com/t5/s/zihoc95639/images/dS00MjE2OTItMjM4NjlpMkQ2RjRFMUZDNDMxN0IxRA?image-dimensions=40x40" alt="Jennifer_Yeung&#x27;s avatar" class="UserAvatar_lia-avatar-img__CUPwZ" aria-hidden="false" crossorigin="use-credentials"/></span></a></div><section class="MessageViewInline_lia-section__mP71c"><div class="MessageViewInline_lia-main__H_QLJ"><h4 title="Secure AI RAG using F5 Distributed Cloud in Red Hat OpenShift AI and NetApp ONTAP Environment" class="styles_text-break__Ny06M MessageViewInline_lia-subject__rxhY_" data-testid="MessageSubject"><a class="MessageViewInline_lia-subject-link__BO63O styles_lia-g-clamp__dg3Sg styles_lia-g-clamp-2__53ACH" data-testid="MessageLink" target="_self" aria-label="Secure AI RAG using F5 Distributed Cloud in Red Hat OpenShift AI and NetApp ONTAP Environment" href="/kb/technicalarticles/secure-ai-rag-using-f5-distributed-cloud-in-red-hat-openshift-ai-and-netapp-onta/339884">Secure AI RAG using F5 Distributed Cloud in Red Hat OpenShift AI and NetApp ONTAP Environment</a></h4><a class="MessageViewInline_lia-content__wPIos" data-testid="MessageLink" target="_self" tabindex="-1" aria-label="Secure AI RAG using F5 Distributed Cloud in Red Hat OpenShift AI and NetApp ONTAP Environment" href="/kb/technicalarticles/secure-ai-rag-using-f5-distributed-cloud-in-red-hat-openshift-ai-and-netapp-onta/339884"><span class="styles_lia-g-message-body__LkV7_ styles_lia-g-message-body-tkb__SZmO_ styles_clearfix__xFEoC styles_lia-g-clamp__dg3Sg styles_lia-g-clamp-3__hQHtO MessageViewInline_lia-body__C9SCk MessageViewInline_lia-body-md__SERhT"> Introduction Retrieval Augmented Generation (RAG) is a powerful technique that allows Large Language Models (LLMs) to access information beyond their training data. The “R” in RAG refers to the data retrieval process, where the system retrieves relevant information from an external knowledge base based on the input query. Next, the “A” in RAG represents the augmentation of context enrichment, as the system combines the retrieved relevant information and the input query to create a more comprehensive prompt for the LLM. Lastly, the “G” in RAG stands for response generation, where the LLM generates a response with a more contextually accurate output based on the augmented prompt as a result. RAG is becoming increasingly popular in enterprise AI applications due to its ability to provide more accurate and contextually relevant responses to a wide range of queries. However, deploying RAG can introduce complexity due to its components being located in different environments. For instance, the datastore or corpus, which is a collection of data, is typically on-premise for enhanced control over data access and management due to data security, governance, and compliance with regulations within the enterprise. Meanwhile, inference services are often deployed in the cloud for their scalability and cost-effectiveness. In this article, we will discuss how F5 Distributed Cloud can simplify the complexity and securely connect all RAG components seamlessly for enterprise RAG-enabled AI applications deployments. Specifically, we will focus on Network Connect, App Connect, and Web App &amp; API Protection. We will demonstrate how these F5 Distributed Cloud features can be leveraged to secure RAG in collaboration with Red Hat OpenShift AI and NetApp ONTAP. Example Topology F5 Distributed Cloud Network Connect F5 Distributed Cloud Network Connect enables seamless and secure network connectivity across hybrid and multicloud environments. By deploying F5 Distributed Cloud Customer Edge (CE) at site, it allows us to easily establish encrypted site-to-site connectivity across on-premises, multi-cloud, and edge environment. Jensen Huang, CEO of NVIDIA, has said that "Nearly half of the files in the world are stored on-prem on NetApp.”. In our example, enterprise data stores are deployed on NetApp ONTAP in a data center in Seattle managed by organization B (Segment-B: s-gorman-production-segment), while RAG services, including embedding Large Language Model (LLM) and vector database, is deployed on-premise on a Red Hat OpenShift cluster in a data center in California managed by Organization A (Segment-A: jy-ocp). By leveraging F5 Distributed Cloud Network Connect, we can quickly and easily establish a secure connection for seamless and efficient data transfer from the enterprise data stores to RAG services between these two segments only: F5 Distributed Cloud CE can be deployed as a virtual machine (VM) or as a pod on a Red Hat OpenShift cluster. In California, we deploy the CE as a VM using Red Hat OpenShift Virtualization — click here to find out more on Deploying F5 Distributed Cloud Customer Edge in Red Hat OpenShift Virtualization: Segment-A: jy-ocp on CE in California and Segment-B: s-gorman-production-segment on CE in Seattle: Simply and securely connect Segment-A: jy-ocp and Segment-B: s-gorman-production-segment only, using Segment Connector: NetApp ONTAP in Seattle has a LUN named “tbd-RAG”, which serves as the enterprise data store in our demo setup and contains a collection of data. After these two data centers are connected using F5 XC Network Connect, a secure encrypted end-to-end connection is established between them. In our example, “test-ai-tbd” is in the data center in California where it hosts the RAG services, including embedding Large Language Model (LLM) and vector database, and it can now successfully connect to the enterprise data stores on NetApp ONTAP in the data center in Seattle: F5 Distributed Cloud App Connect F5 Distributed Cloud App Connect securely connects and delivers distributed applications and services across hybrid and multicloud environments. By utilizing F5 Distributed Cloud App Connect, we can direct the inference traffic through F5 Distributed Cloud's security layers to safeguard our inference endpoints. Red Hat OpenShift on Amazon Web Services (ROSA) is a fully managed service that allows users to develop, run, and scale applications in a native AWS environment. We can host our inference service on ROSA so that we can leverage the scalability, cost-effectiveness, and numerous benefits of AWS’s managed infrastructure services. For instance, we can host our inference service on ROSA by deploying Ollama with multiple AI/ML models: Or, we can enable Model Serving on Red Hat OpenShift AI (RHOAI). Red Hat OpenShift AI (RHOAI) is a flexible and scalable AI/ML platform builds on the capabilities of Red Hat OpenShift that facilitates collaboration among data scientists, engineers, and app developers. This platform allows them to serve, build, train, deploy, test, and monitor AI/ML models and applications either on-premise or in the cloud, fostering efficient innovation within organizations. In our example, we use Red Hat OpenShift AI (RHOAI) Model Serving on ROSA for our inference service: Once inference service is deployed on ROSA, we can utilize F5 Distributed Cloud to secure our inference endpoint by steering the inference traffic through F5 Distributed Cloud's security layers, which offers an extensive suite of features designed specifically for the security of modern AI/ML inference endpoints. This setup would allow us to scrutinize requests, implement policies for detected threats, and protect sensitive datasets before they reach the inferencing service hosted within ROSA. In our example, we setup a F5 Distributed Cloud HTTP Load Balancer (rhoai-llm-serving.f5-demo.com), and we advertise it to the CE in the datacenter in California only: We now reach our Red Hat OpenShift AI (RHOAI) inference endpoint through F5 Distributed Cloud: F5 Distributed Cloud Web App &amp; API Protection F5 Distributed Cloud Web App &amp; API Protection provides comprehensive sets of security features, and uniform observability and policy enforcement to protect apps and APIs across hybrid and multicloud environments. We utilize F5 Distributed Cloud App Connect to steer the inference traffic through F5 Distributed Cloud to secure our inference endpoint. In our example, we protect our Red Hat OpenShift AI (RHOAI) inference endpoint by rate-limiting the access, so that we can ensure no single client would exhaust the inference service: A "Too Many Requests" is received in the response when a single client repeatedly requests access to the inference service at a rate higher than the configured threshold: This is just one of the many security features to protect our inference service. Click here to find out more on Securing Model Serving in Red Hat OpenShift AI (on ROSA) with F5 Distributed Cloud API Security. Demonstration In a real-world scenario, the front-end application could be hosted on the cloud, or hosted at the edge, or served through F5 Distributed Cloud, offering flexible alternatives for efficient application delivery based on user preferences and specific needs. To illustrate how all the discussed components work seamlessly together, we simplify our example by deploying Open WebUI as the front-end application on the Red Hat OpenShift cluster in the data center in California, which includes RAG services. While a DPU or GPU could be used for improved performance, our setup utilizes a CPU for inferencing tasks. We connect our app to our enterprise data stores deployed on NetApp ONTAP in the data center in Seattle using F5 Distributed Cloud Network Connect, where we have a copy of "Chapter 1. About the Migration Toolkit for Virtualization" from Red Hat. These documents are processed and saved to the Vector DB: Our embedding Large Language Model (LLM) is Sentence-Transformers/all-MiniLM-L6-v2, and here is our RAG template: Instead of connecting to the inference endpoint on Red Hat OpenShift AI (RHOAI) on ROSA directly, we connect to the F5 Distributed Cloud HTTP Load Balancer (rhoai-llm-serving.f5-demo.com) from F5 Distributed Cloud App Connect: Previously, we asked, "What is MTV?“ and we never received a response related to Red Hat Migration Toolkit for Virtualization: Now, let's try asking the same question again with RAG services enabled: We finally received the response we had anticipated. Next, we use F5 Distributed Cloud Web App &amp; API Protection to safeguard our Red Hat OpenShift AI (RHOAI) inference endpoint on ROSA by rate-limiting the access, thus preventing a single client from exhausting the inference service: As expected, we received "Too Many Requests" in the response on our app upon requesting the inference service at a rate greater than the set threshold: With F5 Distributed Cloud's real-time observability and security analytics from the F5 Distributed Console, we can proactively monitor for potential threats. For example, if necessary, we can block a client from accessing the inference service by adding it to the Blocked Clients List: As expected, this specific client is now unable to access the inference service: Summary Deploying and securing RAG for enterprise RAG-enabled AI applications in a multi-vendor, hybrid, and multi-cloud environment can present complex challenges. In collaboration with Red Hat OpenShift AI (RHOAI) and NetApp ONTAP, F5 Distributed Cloud provides an effortless solution that secures RAG components seamlessly for enterprise RAG-enabled AI applications. </span><img src="https://community.f5.com/t5/s/zihoc95639/images/bS0zMzk4ODQtWVU1amF6?image-dimensions=300x400&amp;constrain-image=true" alt="" data-testid="messagePreviewImage" crossorigin="use-credentials" class="MessageViewInline_lia-preview-img__v_cnb"/></a></div><div class="MessageViewInline_lia-footer__gNh52"><div class="MessageViewInline_lia-footer-section__99rW3 MessageViewInline_lia-footer-left__gAfgM"><div class="MessageViewInline_lia-byline__I93OZ MessageViewInline_lia-byline-md__VW8Gt"><div class="styles_lia-g-divider__X68T2 MessageViewInline_lia-author-info__8PVPG"><a data-hovercard-trigger="true" data-testid="userLink" class="MessageViewInline_lia-byline-item__kxYvN" aria-label="View Profile: Jennifer_Yeung" aria-describedby="UserHoverCard-421692" target="_self" href="/users/jennifer_yeung/421692">Jennifer_Yeung</a></div><a class="styles_lia-g-divider__X68T2 MessageViewInline_lia-byline-item__kxYvN" data-testid="MessageLink" target="_self" aria-label="2 days ago" href="/kb/technicalarticles/secure-ai-rag-using-f5-distributed-cloud-in-red-hat-openshift-ai-and-netapp-onta/339884"><span data-testid="messageTime"><span title="February 25, 2025 at 3:51 AM" role="none">Feb 25, 2025</span></span></a><a data-hovercard-trigger="true" data-testid="nodeLink" target="_self" class="styles_lia-g-divider__X68T2 MessageViewInline_lia-byline-item__kxYvN MessageViewInline_lia-node__eqyXY" aria-label="Go to parent Technical Articles" href="/category/articles/kb/technicalarticles"><svg class="styles_lia-g-icon-size-12__fO_66 Icon_lia-size-12__l8N3M Icon_lia-icon__on1Gb" data-testid="Icon" style="--lia-local-icon-color:var(--lia-tkb-color);--lia-local-icon-color-h:var(--lia-tkb-color-h);--lia-local-icon-color-s:var(--lia-tkb-color-s);--lia-local-icon-color-l:var(--lia-tkb-color-l)" aria-label="Content Type Knowledge Base icon"><use href="/static/graphics/processed/w78VdNAhVv9lCpAB5qCxSL66EsM/content-knowledge.svg#content-knowledge"></use></svg><span class="styles_sr-only__NOnjB styles_h-auto__SoSGz">Place Technical Articles</span><span aria-hidden="true">Technical Articles</span></a></div></div><div class="MessageViewInline_lia-footer-section__99rW3 MessageViewInline_lia-footer-right__mxWEA"><div class="styles_lia-g-count-wrap___e35P" data-testid="ViewCount"><svg class="styles_lia-g-icon-size-16__V9Va_ Icon_lia-size-16__D8_m2 Icon_lia-icon__on1Gb" data-testid="Icon" style="--lia-local-icon-color:var(--lia-bs-gray-600);--lia-local-icon-color-h:var(--lia-bs-gray-600-h);--lia-local-icon-color-s:var(--lia-bs-gray-600-s);--lia-local-icon-color-l:var(--lia-bs-gray-600-l)" aria-hidden="true"><use href="/static/graphics/processed/w78VdNAhVv9lCpAB5qCxSL66EsM/views.svg#views"></use></svg>119<span class="styles_sr-only__NOnjB">Views</span></div><div class="styles_lia-g-count-wrap___e35P" data-testid="kudosCount"><svg class="styles_lia-g-icon-size-16__V9Va_ Icon_lia-size-16__D8_m2 Icon_lia-icon__on1Gb" data-testid="Icon" style="--lia-local-icon-color:var(--lia-bs-gray-600);--lia-local-icon-color-h:var(--lia-bs-gray-600-h);--lia-local-icon-color-s:var(--lia-bs-gray-600-s);--lia-local-icon-color-l:var(--lia-bs-gray-600-l)" aria-hidden="true"><use href="/static/graphics/processed/w78VdNAhVv9lCpAB5qCxSL66EsM/like.svg#like"></use></svg>0<span class="styles_sr-only__NOnjB">likes</span></div><div class="styles_lia-g-count-wrap___e35P" data-testid="messageRepliesCount"><svg class="styles_lia-g-icon-size-16__V9Va_ Icon_lia-size-16__D8_m2 Icon_lia-icon__on1Gb" data-testid="Icon" style="--lia-local-icon-color:var(--lia-bs-gray-600);--lia-local-icon-color-h:var(--lia-bs-gray-600-h);--lia-local-icon-color-s:var(--lia-bs-gray-600-s);--lia-local-icon-color-l:var(--lia-bs-gray-600-l)" aria-hidden="true"><use href="/static/graphics/processed/w78VdNAhVv9lCpAB5qCxSL66EsM/comment.svg#comment"></use></svg>0<span class="styles_sr-only__NOnjB">Comments</span></div></div></div></section></div></li></ul></section><footer data-testid="PanelItemList.Footer" class="PaneledItemList_lia-panel-list-footer__4l5Jt"><div class="styles_d-flex__7__Y_ styles_justify-content-center__wTGUU"><button title="Show More" data-testid="PagerLoadMore.Button" type="button" class="styles_lia-g-loader-btn__hVmpn PagerLoadMore_lia-pager__BGtW_ styles_btn__1HFm0 styles_btn-link__Qn59s"><svg class="styles_lia-g-mr-5__qkf3_ styles_lia-g-icon-size-16__V9Va_ Icon_lia-size-16__D8_m2 Icon_lia-icon__on1Gb" data-testid="Icon" style="--lia-local-icon-color:var(--lia-load-text-color);--lia-local-icon-color-h:var(--lia-load-text-color-h);--lia-local-icon-color-s:var(--lia-load-text-color-s);--lia-local-icon-color-l:var(--lia-load-text-color-l)" aria-hidden="true"><use href="/static/graphics/processed/w78VdNAhVv9lCpAB5qCxSL66EsM/chevron-down.svg#chevron-down"></use></svg>Show More</button></div></footer></article></div></div></div></div></section></main><footer data-testid="QuiltWrapperSection" style="background:var(--lia-bs-body-color)"><div class="CustomComponent_lia-wrapper__7IqeO" style="--lia-local-bg-color:transparent"><article class="CustomComponent_lia-article__sQ7z4" data-testid="CustomComponent"><section><style> .colorBar { align-items: center; display: flex; justify-content: center; width: 100%; } .colorContainer { height: 20px; } .mainContent { align-items: start; display: grid; grid-template-columns: repeat(4, 1fr); justify-content: center; margin: 1.5rem auto 0 auto; padding: 1rem 0 3rem 0; width: 80%; } .linkContainer { align-items: center; display: flex; flex-direction: column; justify-content: start; } .linkContainerTitle { color: white; font-size: 1.2rem; text-align: center; } .linkItem { color: white; font-size: 1rem; text-decoration: none; text-align: center; } .linkItem:hover { color: white; font-size: 1rem; text-decoration: underline; } .rightsContent { align-items: center; display: flex; justify-content: center; margin-top: 2rem; } .rightsContent img { margin-right: 1rem; height: 3rem; width: 3rem; } .rightsContent span { color: white; font-size: 1rem; } .footerBottomContainer { align-items: center; display: flex; flex-wrap: wrap; justify-content: center; margin: 0 auto; margin-bottom: 4rem; margin-top: 2rem; padding: 0; row-gap: 1rem; width: 80%; } .footerBottomContainer a { color: white; font-size: 0.8rem; margin: 0 0.5rem; text-decoration: none; } #icon-id09442304857232617 { color: white; cursor: pointer; font-size: 0.8rem; margin: 0; text-decoration: none; } .footerBottomContainer a:hover { color: white; cursor: pointer; font-size: 0.8rem; text-decoration: underline; } @media (max-width: 1100px) { .mainContent { grid-template-columns: repeat(3, 1fr); grid-row-gap: 2em; } } @media (max-width: 750px) { .mainContent { grid-template-columns: repeat(2, 1fr); grid-row-gap: 2rem; } } @media (max-width: 450px) { .mainContent { grid-template-columns: repeat(1, 1fr); grid-row-gap: 2rem; } } </style> <div class="betaFooter"> <div class="colorBar"> <div class="colorContainer" style="background:#F29A36;width:13%"> </div> <div class="colorContainer" style="background:#E4002B;width:39%"> </div> <div class="colorContainer" style="background:#AB2782;width:13%"> </div> <div class="colorContainer" style="background:#0E41AA;width:25%"> </div> <div class="colorContainer" style="background:#4A1968;width:10%"> </div> </div> <div class="mainContent"> <div class="linkContainer"> <h3 class="linkContainerTitle">ABOUT DEVCENTRAL</h3> <a class="linkItem" href="https://community.f5.com/category/Articles/kb/DevCentralNews" target="_blank" rel="noopener">DevCentral News</a> <a class="linkItem" href="https://community.f5.com/category/Forums/discussions/TechnicalForum" target="_blank" rel="noopener">Technical Forum</a> <a class="linkItem" href="https://community.f5.com/category/Articles/kb/TechnicalArticles" target="_blank" rel="noopener">Technical Articles</a> <a class="linkItem" href="https://community.f5.com/category/CrowdSRC" target="_blank" rel="noopener">Technical CrowdSRC</a> <a class="linkItem" href="https://community.f5.com/t5/devcentral-news/devcentral-community-guidelines/ta-p/291537" target="_blank" rel="noopener">Community Guidelines</a> <a class="linkItem" href="https://community.f5.com/t5/devcentral-news/devcentral-end-user-license-agreement/ta-p/291544" target="_blank" rel="noopener">DevCentral EULA</a> <a class="linkItem" href="https://community.f5.com/t5/technical-articles/how-to-get-a-f5-big-ip-ve-developer-lab-license/ta-p/279858" target="_blank" rel="noopener">Get a Developer Lab License</a> <a class="linkItem" href="https://community.f5.com/t5/devcentral-news/devcentral-mvp-program/ta-p/291570" target="_blank" rel="noopener">Become a DevCentral MVP</a> </div> <div class="linkContainer"> <h3 class="linkContainerTitle">RESOURCES</h3> <a class="linkItem" href="https://support.f5.com/csp/home" target="_blank" rel="noopener">Product Documentation</a> <a class="linkItem" href="https://www.f5.com/services/resources/white-papers.html" target="_blank" rel="noopener">White Papers</a> <a class="linkItem" href="https://www.f5.com/glossary" target="_blank" rel="noopener">Glossary</a> <a class="linkItem" href="https://www.f5.com/customer-stories.html" target="_blank" rel="noopener">Customer Stories</a> <a class="linkItem" href="https://www.f5.com/company/events/webinars" target="_blank" rel="noopener">Webinars</a> <a class="linkItem" href="https://www.f5.com/services/training/free-training-courses/getting-started-start-here.html" target="_blank" rel="noopener">Free Online Courses</a> <a class="linkItem" href="https://www.f5.com/services/certification.html" target="_blank" rel="noopener">F5 Certification</a> <a class="linkItem" href="https://www.f5.com/services/training.html" target="_blank" rel="noopener">LearnF5 Training</a> </div> <div class="linkContainer"> <h3 class="linkContainerTitle">SUPPORT</h3> <a class="linkItem" href="https://account.f5.com/myf5" target="_blank" rel="noopener">Manage Subscriptions</a> <a class="linkItem" href="https://www.f5.com/services/professional-services" target="_blank" rel="noopener">Professional Services</a> <a class="linkItem" href="https://www.f5.com/services#professional-services" target="_blank" rel="noopener">Professional Services</a> <a class="linkItem" href="https://my.f5.com/manage/s/" target="_blank" rel="noopener">Create a Service Request</a> <a class="linkItem" href="https://login.f5.com/resource/login.jsp?ctx=719748" target="_blank" rel="noopener">Software Downloads</a> <a class="linkItem" href="https://my.f5.com/manage/s/" target="_blank" rel="noopener">Support Portal</a> </div> <div class="linkContainer"> <h3 class="linkContainerTitle">PARTNERS</h3> <a class="linkItem" href="https://www.f5.com/partners/find-a-partner" target="_blank" rel="noopener">Find a Reseller Partner</a> <a class="linkItem" href="https://www.f5.com/partners/technology-alliances" target="_blank" rel="noopener">Technology Alliances</a> <a class="linkItem" href="https://www.f5.com/partners" target="_blank" rel="noopener">Become an F5 Partner</a> <a class="linkItem" href="https://partnercentral.f5.com/" target="_blank" rel="noopener">Login to Partner Central</a> </div> </div> <hr style="height:2px;background:#666666;width:89%"/> <div class="rightsContent"> <img src="https://www.f5.com/content/dam/f5/f5-logo.svg" alt="F5 logo"/> <span>©2024 F5, Inc. All rights reserved.</span> </div> </div> <div id="footerBottomCont" class="footerBottomContainer"> <a href="https://www.f5.com/company/policies/trademarks">Trademarks</a> <a href="https://www.f5.com/company/policies">Policies</a> <a href="https://www.f5.com/company/policies/privacy-compliance-and-practices">Privacy</a> <a href="https://www.f5.com/company/policies/privacy-notice#ca">California Privacy</a> <a href="https://privacyportal.onetrust.com/webform/86c88b66-1c6e-4a7d-8530-6d754439e01a/45381ea3-ec70-4d89-a08e-7633b8fdc40a">Do Not Sell My Personal Information</a> </div></section></article></div><div class="CustomComponent_lia-wrapper__7IqeO" style="--lia-local-bg-color:transparent"><article class="CustomComponent_lia-article__sQ7z4" data-testid="CustomComponent"><section> <!-- --> <!-- --> <!-- --> <!-- --> <!-- --> </section></article></div><div class="CustomComponent_lia-wrapper__7IqeO" style="--lia-local-bg-color:transparent"><article class="CustomComponent_lia-article__sQ7z4" data-testid="CustomComponent"><section class="styles_lia-g-message-body__LkV7_"><div class="CustomComponentContent_lia-content-wrap__5OF48"><div><DIV id="consent_blackbar" style="position: fixed; top: 0px; width: 100%;"></DIV></div></div></section></article></div></footer></div><script id="__NEXT_DATA__" type="application/json" crossorigin="anonymous">{"props":{"pageProps":{"locale":"en-US","tenant":{"id":"f5.prod","enabled":true,"auroraHost":"https://community.f5.com","host":"https://community.f5.com","phase":"prod","community":"zihoc95639","ssl":true,"basePath":"","liaContextPath":"/t5/s","sameSite":true,"useEncodedIds":false,"publicConfig":{"repoName":"f5","moduleFederationHost":"https://aurora-customization-usw2.lithium.com","mainBranchName":"main","sdkEnabled":false,"auroraAnalyticsEnabled":true,"auroraAuditEnabled":false,"auroraFeaturedWidgetsEnabled":true,"auroraFeaturedContentTopicMessagesLimit":50,"auroraFeaturedPlacesNodesLimit":50,"auroraUnreleasedSettingsEnabled":false,"googleMapsApiKey":"AIzaSyCy-sFJSY5bbkojLxy_bLmMm4vxk4R-nac","labelsEnabled":true,"pendoEnabled":true,"pendoApiKey":"16d69dfe-7be6-4eb7-59b7-708c84e89099","reCaptchaV3Enabled":true,"reCaptchaV3ScoreThreshold":0.5,"reCaptchaV3SiteKey":"6LcfUxUcAAAAAH1DBxd4uJIxf5ITF4YwCRUVJHsY","supportedLanguages":["en-US","es-ES","fr-FR","ja-JP","it-IT","lv-LV","nl-NL","pt-BR","pt-PT","ro-RO","ru-RU","pl-PL","da-DK","de-DE","en-GB","ko-KR","zh-CN"],"trafficVisitorCookieMaxAge":15780000,"videosFileType":[".wmv",".avi",".mov",".moov",".mpg",".mpeg",".m2t",".m2v",".vob",".flv",".mp4",".mpg4",".mkv",".asf",".m4v",".m2p",".3gp",".3g2",".f4v",".mp3",".m4a",".wma",".aac"],"sitemapEnabled":true,"quiltsV2Enabled":true,"multiTemplatesEnabled":true,"localizedQuiltWrapperEnabled":false,"samlEnabled":false,"ssoAllowNormalSignon":false,"ideasEnabled":true,"occasionsEnabled":true,"oidcssEnabled":true,"oidcssPostLogoutEndpointEnabled":false,"jwtSsoEnabled":false,"multiAuthEnabled":false,"multiAuthLocalisation":false,"inviteByEmailForGrouphubsEnabled":true,"switchUserFeatureEnabled":true,"messageStatusEnabled":true,"videoEnabled":true,"externalVideoEnabled":true,"salesforceIntegrationEnabled":false,"casePortalEnabled":false,"resetPermissionsEnabled":false,"closeAccountEnabled":true,"threadSummaryLimit":-1,"maxFeaturedGuestForEvents":10,"auroraEndpointsEnabled":true,"anonymousUserDeletionEnabled":true,"poweredByLogoEnabled":true,"endpointReloadInterval":120000,"maxOpenStreamsForEndpoints":0,"endpointBranchCompareIncludeFilter":"*.js,*.json,*.graphql","showExternalVideoCookieBanner":true,"maxGuidesAndContentLimit":500,"auroraThirdPartyAnalyticsEnabled":true,"contentArchiveEnabled":true,"auroraFirehoseEnabled":false,"auroraFirehoseFilterEventsEnabled":false,"mentionsEnabled":true,"featuredGuideLimit":100,"contentBulkArchiveEnabled":false,"devBranchesLimit":5},"baseUrl":"https://community.f5.com","fresh":true,"useBasicAuth":true},"routeInfo":{"path":"/tag/security","pageName":"TagPage"},"csrfToken":"961734710b9a4dfcdd4d00f6fe284bdcf9f466b738b86699bf881a9d929f4510db1d24e57ce2ec551524dbe8ba5718a372cf8fda9cf0e87b37d84c2163a9fa16","authToken":{"token":"Bearer dxt/qTDB48BTsT+0WX6fEZd9FLNfS2ZHL7rvQh1gTIg=","expires":86400,"headerName":"Authorization","providerName":"OAUTH2_CC_None"},"switchUserId":null,"isCrawler":false,"apolloState":{"Community:community:zihoc95639":{"__typename":"Community","id":"community:zihoc95639","ssoProperties":{"__typename":"SsoProperties","ssoEnabled":{"__typename":"PolicyResult","failureReason":null},"communitySignUpUrl":"/t5/s/zihoc95639/v1/auth/oidcss/sso_login_redirect/provider/default","communitySignOnUrl":"/t5/s/zihoc95639/v1/auth/oidcss/sso_login_redirect/provider/default","communitySignOffUrl":"","khorosSignUpUrl":"","khorosSignOnUrl":"","khorosSignOffUrl":"","samlSignOnUrl":"","samlSignOffUrl":"","oidcssSignOnUrl":"","oidcssSignOffUrl":"","jwtSsoSignOnUrl":null,"jwtSsoSignOffUrl":null,"ssoBounceUrl":"","ssoQsParam":"referer"},"samlProperties":{"__typename":"SamlProperties","samlEnabled":{"__typename":"PolicyResult","failureReason":{"__typename":"FailureReason","message":"error.lithium.policies.feature.saml.enabled.accessDenied","key":"error.lithium.policies.feature.saml.enabled.accessDenied","args":[]}},"registerQueryStringEnabled":false,"registerQueryStringValue":"","registerQueryStringEncodeValueEnabled":false,"loginQueryStringEnabled":false,"loginQueryStringValue":"","loginQueryStringEncodeValueEnabled":false,"idpBindingType":"post","idpOneBindingType":"post","idpTwoBindingType":"post"},"seoProperties":{"__typename":"SeoProperties","customOGSiteName":"DevCentral - an F5 Community","appendTopicUidInHead":false,"linkCommentToTimeStamp":true,"lowercasePath":true},"languageProperties":{"__typename":"LanguageProperties","language":"en-US"},"cookieProperties":{"__typename":"CookieProperties","cookiePrivacyPolicyUrl":"https://www.f5.com/company/policies/privacy-notice","isCookieBannerEnabled":false},"searchProperties":{"__typename":"SearchProperties","chatProperties":{"__typename":"ChatProperties","brandMessengerWidgetId":"","brandMessengerCompanyKey":"","brandMessengerScriptSource":"","brandMessengerElementSelector":""}},"knowledgeBaseProperties":{"__typename":"KnowledgeBaseProperties","isGuidesAndChaptersEnabled":true},"communityPolicies":{"__typename":"CommunityPolicies","localizedCategoriesFeatureEnabled":{"__typename":"PolicyResult","failureReason":{"__typename":"FailureReason","message":"error.lithium.policies.feature.localized_categories.enabled.accessDenied","key":"error.lithium.policies.feature.localized_categories.enabled.accessDenied","args":[]}},"canAdminNode":{"__typename":"PolicyResult","failureReason":{"__typename":"FailureReason","message":"error.lithium.policies.feature.nodes.action.update_node_with_admin_privilege.allowed.accessDenied","key":"error.lithium.policies.feature.nodes.action.update_node_with_admin_privilege.allowed.accessDenied","args":[]}}},"badgeProperties":{"__typename":"BadgeProperties","enabled":{"__typename":"PolicyResult","failureReason":null}},"maintenanceProperties":{"__typename":"MaintenanceProperties","isMaintenanceModeEnabled":false},"timezoneProperties":{"__typename":"TimezoneProperties","timezone":"US/Pacific"},"displayId":"zihoc95639","nodeType":"community","title":"DevCentral","seoTitle":"DevCentral: An F5 Technical Community","description":"We are an online community of technical peers dedicated to learning, exchanging ideas, and solving problems - together.","avatar":null,"userContext":{"__typename":"NodeUserContext","canUpdateNode":false,"canAddAttachments":false,"canPostMessages":false,"isSubscribed":false},"entityType":"COMMUNITY","depth":0,"profileSettings":{"__typename":"ProfileSettings","language":null},"tagPolicies":{"__typename":"TagPolicies","canSubscribeTagOnNode":{"__typename":"PolicyResult","failureReason":{"__typename":"FailureReason","message":"error.lithium.policies.labels.action.corenode.subscribe_labels.allow.accessDenied","key":"error.lithium.policies.labels.action.corenode.subscribe_labels.allow.accessDenied","args":[]}},"canManageTagDashboard":{"__typename":"PolicyResult","failureReason":{"__typename":"FailureReason","message":"error.lithium.policies.labels.action.corenode.admin_labels.allow.accessDenied","key":"error.lithium.policies.labels.action.corenode.admin_labels.allow.accessDenied","args":[]}}}},"ROOT_QUERY":{"__typename":"Query","allowedLanguages":["en-US"],"authProviders":[],"community":{"__ref":"Community:community:zihoc95639"},"cachedAsset({\"assetId\":\"pages\",\"assetType\":\"pages\",\"lastModified\":\"000\"})":{"__ref":"CachedAsset:pages-1740169745983"},"cachedText({\"locale\":\"en-US\",\"namespaces\":[\"components/context/AppContext/AppContextProvider\"]})":[{"__ref":"CachedAsset:text:en_US-components/context/AppContext/AppContextProvider-0"}],"cachedText({\"locale\":\"en-US\",\"namespaces\":[\"shared/client/components/common/Loading/LoadingDot\"]})":[{"__ref":"CachedAsset:text:en_US-shared/client/components/common/Loading/LoadingDot-0"}],"self":{"__ref":"User:user:-1"},"theme({\"coreNodeId\":null})":{"__typename":"ThemeResponse","result":{"__ref":"Theme:customTheme1"}},"canAccess":true,"canRegister":true,"componentsLastModified":"1740169766739","quiltLastModified":"1740169743882","pagesLastModified":"1740169745983","pageScriptsLastModified":"1740169770003","textLastModified":"1740415743150","themeLastModified":"1740169745569","fieldDefinitionsLastModified":"1740169677766","entityDefinitionsLastModified":"1740169677766","quiltWrapperLastModified":"1740415742930","cachedAsset({\"assetId\":\"pages\",\"assetType\":\"pages\",\"lastModified\":\"1740169745983\"})":{"__ref":"CachedAsset:pages-1740169745983"},"cachedAsset({\"assetId\":\"customTheme1\",\"assetType\":\"theme\",\"lastModified\":\"1740169745569\",\"locale\":null,\"node\":null})":{"__ref":"CachedAsset:theme:customTheme1-1740169745569"},"cachedText({\"lastModified\":\"1740415743150\",\"locale\":\"en-US\",\"namespaces\":[\"components/common/EmailVerification\"]})":[{"__ref":"CachedAsset:text:en_US-components/common/EmailVerification-1740415743150"}],"cachedText({\"lastModified\":\"1740415743150\",\"locale\":\"en-US\",\"namespaces\":[\"shared/client/components/common/Loading/LoadingDot\"]})":[{"__ref":"CachedAsset:text:en_US-shared/client/components/common/Loading/LoadingDot-1740415743150"}],"cachedText({\"lastModified\":\"1740415743150\",\"locale\":\"en-US\",\"namespaces\":[\"pages/tags/TagPage\"]})":[{"__ref":"CachedAsset:text:en_US-pages/tags/TagPage-1740415743150"}],"tagExists({\"tagText\":\"security\"})":{"__typename":"TagExistsResponse","status":true,"errors":null},"coreNode({\"id\":\"community:zihoc95639\"})":{"__ref":"Community:community:zihoc95639"},"cachedAsset({\"assetId\":\"pages/tags/TagPage\",\"assetType\":\"quilt\",\"lastModified\":\"1740169743882\",\"locale\":null,\"node\":\"community:zihoc95639\"})":{"__ref":"CachedAsset:quilt:f5.prod:pages/tags/TagPage:community:zihoc95639-1740169743882"},"cachedAsset({\"assetId\":\"Common\",\"assetType\":\"quiltWrapper\",\"lastModified\":\"1740415742930\",\"locale\":null,\"node\":null})":{"__ref":"CachedAsset:quiltWrapper:f5.prod:Common:1740415742930"},"cachedText({\"lastModified\":\"1740415743150\",\"locale\":\"en-US\",\"namespaces\":[\"components/common/ActionFeedback\"]})":[{"__ref":"CachedAsset:text:en_US-components/common/ActionFeedback-1740415743150"}],"cachedAsset({\"assetId\":\"custom.widget.Beta_MetaNav-en-US\",\"assetType\":\"component\",\"lastModified\":\"1740169766739\",\"locale\":null,\"node\":null})":{"__ref":"CachedAsset:component:custom.widget.Beta_MetaNav-en-1740169766739"},"cachedAsset({\"assetId\":\"custom.widget.Beta_Footer-en-US\",\"assetType\":\"component\",\"lastModified\":\"1740169766739\",\"locale\":null,\"node\":null})":{"__ref":"CachedAsset:component:custom.widget.Beta_Footer-en-1740169766739"},"cachedAsset({\"assetId\":\"custom.widget.Tag_Manager_Helper-en-US\",\"assetType\":\"component\",\"lastModified\":\"1740169766739\",\"locale\":null,\"node\":null})":{"__ref":"CachedAsset:component:custom.widget.Tag_Manager_Helper-en-1740169766739"},"cachedAsset({\"assetId\":\"custom.widget.Consent_Blackbar-en-US\",\"assetType\":\"component\",\"lastModified\":\"1740169766739\",\"locale\":null,\"node\":null})":{"__ref":"CachedAsset:component:custom.widget.Consent_Blackbar-en-1740169766739"},"cachedText({\"lastModified\":\"1740415743150\",\"locale\":\"en-US\",\"namespaces\":[\"components/community/Breadcrumb\"]})":[{"__ref":"CachedAsset:text:en_US-components/community/Breadcrumb-1740415743150"}],"cachedText({\"lastModified\":\"1740415743150\",\"locale\":\"en-US\",\"namespaces\":[\"components/tags/TagsHeaderWidget\"]})":[{"__ref":"CachedAsset:text:en_US-components/tags/TagsHeaderWidget-1740415743150"}],"cachedText({\"lastModified\":\"1740415743150\",\"locale\":\"en-US\",\"namespaces\":[\"components/messages/MessageListForNodeByRecentActivityWidget\"]})":[{"__ref":"CachedAsset:text:en_US-components/messages/MessageListForNodeByRecentActivityWidget-1740415743150"}],"coreNodes({\"constraints\":{\"id\":{\"in\":[\"category:Forums\",\"board:TechnicalForum\",\"board:WaterCooler\",\"category:CrowdSRC\",\"board:codeshare\",\"board:communityarticles\",\"category:Articles\",\"board:TechnicalArticles\",\"board:article-series\",\"board:security-insights\",\"board:DevCentralNews\",\"category:GroupsCategory\",\"category:CommunityGroups\",\"category:F5-Groups\",\"board:Events\",\"board:Suggestions\"]}},\"first\":16})":{"__typename":"CoreNodeConnection","edges":[{"__typename":"CoreNodeEdge","node":{"__ref":"Category:category:Forums"}},{"__typename":"CoreNodeEdge","node":{"__ref":"Forum:board:TechnicalForum"}},{"__typename":"CoreNodeEdge","node":{"__ref":"Forum:board:WaterCooler"}},{"__typename":"CoreNodeEdge","node":{"__ref":"Category:category:Articles"}},{"__typename":"CoreNodeEdge","node":{"__ref":"Tkb:board:TechnicalArticles"}},{"__typename":"CoreNodeEdge","node":{"__ref":"Tkb:board:DevCentralNews"}},{"__typename":"CoreNodeEdge","node":{"__ref":"Category:category:GroupsCategory"}},{"__typename":"CoreNodeEdge","node":{"__ref":"Category:category:F5-Groups"}},{"__typename":"CoreNodeEdge","node":{"__ref":"Category:category:CommunityGroups"}},{"__typename":"CoreNodeEdge","node":{"__ref":"Occasion:board:Events"}},{"__typename":"CoreNodeEdge","node":{"__ref":"Idea:board:Suggestions"}},{"__typename":"CoreNodeEdge","node":{"__ref":"Category:category:CrowdSRC"}},{"__typename":"CoreNodeEdge","node":{"__ref":"Tkb:board:codeshare"}},{"__typename":"CoreNodeEdge","node":{"__ref":"Tkb:board:communityarticles"}},{"__typename":"CoreNodeEdge","node":{"__ref":"Tkb:board:security-insights"}},{"__typename":"CoreNodeEdge","node":{"__ref":"Tkb:board:article-series"}}]},"messages({\"constraints\":{\"tagsText\":{\"eq\":\"security\"}}})":{"__typename":"MessageConnection","totalCount":17745},"messages({\"constraints\":{\"depth\":{\"eq\":0},\"tagsText\":{\"in\":[\"security\"]}},\"first\":10,\"sorts\":{\"conversationLastPostingActivityTime\":{\"direction\":\"DESC\"}}})":{"__typename":"MessageConnection","edges":[{"__typename":"MessageEdge","cursor":"MjUuMXwyLjF8aXwxMHw0OjB8aW50LDMzODg3MywzMzg4NzM","node":{"__ref":"TkbTopicMessage:message:338873"}},{"__typename":"MessageEdge","cursor":"MjUuMXwyLjF8aXwxMHw0OjB8aW50LDMzODg3MywzMzk5OTU","node":{"__ref":"TkbTopicMessage:message:339995"}},{"__typename":"MessageEdge","cursor":"MjUuMXwyLjF8aXwxMHw0OjB8aW50LDMzODg3MywyOTM4OTY","node":{"__ref":"TkbTopicMessage:message:293896"}},{"__typename":"MessageEdge","cursor":"MjUuMXwyLjF8aXwxMHw0OjB8aW50LDMzODg3MywyODM5NzE","node":{"__ref":"TkbTopicMessage:message:283971"}},{"__typename":"MessageEdge","cursor":"MjUuMXwyLjF8aXwxMHw0OjB8aW50LDMzODg3MywzNDAwMTc","node":{"__ref":"ForumTopicMessage:message:340017"}},{"__typename":"MessageEdge","cursor":"MjUuMXwyLjF8aXwxMHw0OjB8aW50LDMzODg3MywzMzk4ODU","node":{"__ref":"ForumTopicMessage:message:339885"}},{"__typename":"MessageEdge","cursor":"MjUuMXwyLjF8aXwxMHw0OjB8aW50LDMzODg3MywzMTY3NTI","node":{"__ref":"ForumTopicMessage:message:316752"}},{"__typename":"MessageEdge","cursor":"MjUuMXwyLjF8aXwxMHw0OjB8aW50LDMzODg3MywzMzk2ODQ","node":{"__ref":"ForumTopicMessage:message:339684"}},{"__typename":"MessageEdge","cursor":"MjUuMXwyLjF8aXwxMHw0OjB8aW50LDMzODg3MywzMTA4OTY","node":{"__ref":"TkbTopicMessage:message:310896"}},{"__typename":"MessageEdge","cursor":"MjUuMXwyLjF8aXwxMHw0OjB8aW50LDMzODg3MywzMzk4ODQ","node":{"__ref":"TkbTopicMessage:message:339884"}}],"pageInfo":{"__typename":"PageInfo","hasNextPage":true,"endCursor":"MjUuMXwyLjF8aXwxMHw0OjB8aW50LDMzODg3MywzMzk4ODQ"},"totalCount":17743},"cachedText({\"lastModified\":\"1740415743150\",\"locale\":\"en-US\",\"namespaces\":[\"components/community/Navbar\"]})":[{"__ref":"CachedAsset:text:en_US-components/community/Navbar-1740415743150"}],"cachedText({\"lastModified\":\"1740415743150\",\"locale\":\"en-US\",\"namespaces\":[\"components/community/NavbarHamburgerDropdown\"]})":[{"__ref":"CachedAsset:text:en_US-components/community/NavbarHamburgerDropdown-1740415743150"}],"cachedText({\"lastModified\":\"1740415743150\",\"locale\":\"en-US\",\"namespaces\":[\"components/community/BrandLogo\"]})":[{"__ref":"CachedAsset:text:en_US-components/community/BrandLogo-1740415743150"}],"cachedText({\"lastModified\":\"1740415743150\",\"locale\":\"en-US\",\"namespaces\":[\"components/community/NavbarTextLinks\"]})":[{"__ref":"CachedAsset:text:en_US-components/community/NavbarTextLinks-1740415743150"}],"cachedText({\"lastModified\":\"1740415743150\",\"locale\":\"en-US\",\"namespaces\":[\"components/authentication/AuthenticationLink\"]})":[{"__ref":"CachedAsset:text:en_US-components/authentication/AuthenticationLink-1740415743150"}],"cachedText({\"lastModified\":\"1740415743150\",\"locale\":\"en-US\",\"namespaces\":[\"components/nodes/NodeLink\"]})":[{"__ref":"CachedAsset:text:en_US-components/nodes/NodeLink-1740415743150"}],"cachedText({\"lastModified\":\"1740415743150\",\"locale\":\"en-US\",\"namespaces\":[\"components/tags/TagSubscriptionAction\"]})":[{"__ref":"CachedAsset:text:en_US-components/tags/TagSubscriptionAction-1740415743150"}],"cachedText({\"lastModified\":\"1740415743150\",\"locale\":\"en-US\",\"namespaces\":[\"components/messages/MessageListTabs\"]})":[{"__ref":"CachedAsset:text:en_US-components/messages/MessageListTabs-1740415743150"}],"cachedText({\"lastModified\":\"1740415743150\",\"locale\":\"en-US\",\"namespaces\":[\"shared/client/components/common/QueryHandler\"]})":[{"__ref":"CachedAsset:text:en_US-shared/client/components/common/QueryHandler-1740415743150"}],"tagFollowsForNodes({\"nodeIds\":\"category:top\",\"tagText\":\"security\"})":[{"__typename":"TagFollowForNodeResponse","coreNode":{"__ref":"Category:category:top"},"follow":null}],"component({\"componentId\":\"custom.widget.Beta_MetaNav\"})":{"__typename":"Component","render({\"context\":{\"component\":{\"entities\":[],\"props\":{}},\"page\":{\"entities\":[],\"name\":\"TagPage\",\"props\":{},\"url\":\"https://community.f5.com/tag/security\"}}})":{"__typename":"ComponentRenderResult","html":"\u003cstyle\u003e .metaNav { align-items: center; background: #ffffff; display: flex; justify-content: space-between; position: relative; padding: 10px 30px; width: 100%; z-index: 1021; } .metaNavCta{ align-items: center; cursor: pointer; display: flex; justify-content: center; padding: 5px; } .metaNavCta a { color: #333 !important; text-decoration: none; font-size: 1rem; } .metaNavCta a:hover { text-decoration: underline !important; } .metaNavCta svg { margin-left: 3px; fill: #333; height: 15px; } .metaNavList { background: #f1f1f1; position: absolute; padding: 10px 15px; top: 30px; width: 250px; z-index: 4; } #metaFirstList { left: 0; } #metaSecondList { right: 0; } .metaNavList li { color: #666; cursor: pointer; font-weight: normal; font-size: 14px; list-style: none; line-height: 35px; padding: 0 10px; margin: 0 auto; } .metaNavList li a { color: #666; font-weight: normal; font-size: 14px; list-style: none; text-decoration: none; } .metaNavList li:hover { background: #ddd; } .hidden { display: none; transition: all 400ms ease; transform: scale(0); } .mfaContainer { align-items: center; display: flex; justify-content: center; } .mfaContainer p { color: #222222; margin: 0; margin-right: 1rem; font-size: 1rem; } .mfaContainer a { align-items: center; margin: 0; display: flex; background: #f5f5f5; border: 2px solid #707070; border-radius: 10px; justify-content: center; color: #707070; text-decoration: none; height: 30px; width: 80px; } \u003c/style\u003e \u003cnav class=\"metaNav\" data-js-meta-nav-main-container\u003e \u003cdiv class=\"metaNavCta\" data-js-meta-nav-first-cta\u003e \u003ca\u003eF5 Sites\u003c/a\u003e \u003csvg xmlns=\"http://www.w3.org/2000/svg\" width=\"24\" height=\"24\" viewBox=\"0 0 24 24\"\u003e\u003cpath d=\"M0 7.33l2.829-2.83 9.175 9.339 9.167-9.339 2.829 2.83-11.996 12.17z\"/\u003e\u003c/svg\u003e \u003c/div\u003e \u003cul id=\"metaFirstList\" class=\"metaNavList hidden\" data-js-meta-nav-first-list\u003e \u003cli\u003e \u003ca href=\"https://f5.com/\"\u003eF5.com\u003c/a\u003e \u003c/li\u003e \u003cli\u003e \u003ca href=\"https://account.f5.com/learnf5\"\u003eLearnF5\u003c/a\u003e \u003c/li\u003e \u003cli\u003e \u003ca href=\"https://www.nginx.com/\"\u003eNGINX\u003c/a\u003e \u003c/li\u003e \u003cli\u003e \u003ca href=\"https://my.f5.com/\"\u003eMyF5\u003c/a\u003e \u003c/li\u003e \u003cli\u003e \u003ca href=\"https://partnercentral.f5.com/\"\u003ePartner Central\u003c/a\u003e \u003c/li\u003e \u003c/ul\u003e \u003cdiv class=\"metaNavCta\" data-js-meta-nav-second-cta\u003e \u003ca\u003eContact\u003c/a\u003e \u003csvg xmlns=\"http://www.w3.org/2000/svg\" width=\"24\" height=\"24\" viewBox=\"0 0 24 24\"\u003e\u003cpath d=\"M0 7.33l2.829-2.83 9.175 9.339 9.167-9.339 2.829 2.83-11.996 12.17z\"/\u003e\u003c/svg\u003e \u003c/div\u003e \u003cul id=\"metaSecondList\" class=\"metaNavList hidden\" data-js-meta-nav-second-list\u003e \u003cli\u003e \u003ca href=\"https://www.f5.com/content/f5-com/en_us/attack\"\u003eUnder Attack?\u003c/a\u003e \u003c/li\u003e \u003cli\u003e \u003ca href=\"https://www.f5.com/company/contact/regional-offices#product-support\"\u003eF5 Support\u003c/a\u003e \u003c/li\u003e \u003cli\u003e \u003ca href=\"https://community.f5.com/t5/devcentral-news/support-and-help-for-devcentral-and-offline-contact/ta-p/291959\"\u003eDevCentral Support\u003c/a\u003e \u003c/li\u003e \u003cli\u003e \u003ca href=\"https://www.f5.com/products/get-f5?ls=meta#contactsales\"\u003eF5 Sales\u003c/a\u003e \u003c/li\u003e \u003cli\u003e \u003ca href=\"https://www.nginx.com/contact-sales/\"\u003eNGINX Sales\u003c/a\u003e \u003c/li\u003e \u003cli\u003e \u003ca href=\"https://www.f5.com/services/professional-services/request-f5-professional-services\"\u003eF5 Professional Services\u003c/a\u003e \u003c/li\u003e \u003c/ul\u003e \u003c/nav\u003e \u003cscript\u003e function initializeMetaNav() { const firstCta = document.querySelector('[data-js-meta-nav-first-cta]'); const secondCta = document.querySelector('[data-js-meta-nav-second-cta]'); const firstList = document.querySelector('[data-js-meta-nav-first-list]'); const secondList = document.querySelector('[data-js-meta-nav-second-list]'); const metaContainer = document.querySelector('[data-js-meta-nav-main-container]'); metaContainer.addEventListener('click', function(event) { if (event.target === metaContainer) { firstList.classList.add('hidden'); secondList.classList.add('hidden'); } }); firstCta.addEventListener(\"click\", function(event) { event.stopPropagation(); firstList.classList.toggle('hidden'); if (!secondList.classList.contains('hidden')) { secondList.classList.add('hidden'); } }); secondCta.addEventListener(\"click\", function(event) { event.stopPropagation(); secondList.classList.toggle('hidden'); if (!firstList.classList.contains('hidden')) { firstList.classList.add('hidden'); } }); } initializeMetaNav(); \u003c/script\u003e"}},"componentScriptGroups({\"componentId\":\"custom.widget.Beta_MetaNav\"})":{"__typename":"ComponentScriptGroups","scriptGroups":{"__typename":"ComponentScriptGroupsDefinition","afterInteractive":{"__typename":"PageScriptGroupDefinition","group":"AFTER_INTERACTIVE","scriptIds":[]},"lazyOnLoad":{"__typename":"PageScriptGroupDefinition","group":"LAZY_ON_LOAD","scriptIds":[]}},"componentScripts":[]},"component({\"componentId\":\"custom.widget.Beta_Footer\"})":{"__typename":"Component","render({\"context\":{\"component\":{\"entities\":[],\"props\":{}},\"page\":{\"entities\":[],\"name\":\"TagPage\",\"props\":{},\"url\":\"https://community.f5.com/tag/security\"}}})":{"__typename":"ComponentRenderResult","html":"\u003cstyle\u003e .colorBar { align-items: center; display: flex; justify-content: center; width: 100%; } .colorContainer { height: 20px; } .mainContent { align-items: start; display: grid; grid-template-columns: repeat(4, 1fr); justify-content: center; margin: 1.5rem auto 0 auto; padding: 1rem 0 3rem 0; width: 80%; } .linkContainer { align-items: center; display: flex; flex-direction: column; justify-content: start; } .linkContainerTitle { color: white; font-size: 1.2rem; text-align: center; } .linkItem { color: white; font-size: 1rem; text-decoration: none; text-align: center; } .linkItem:hover { color: white; font-size: 1rem; text-decoration: underline; } .rightsContent { align-items: center; display: flex; justify-content: center; margin-top: 2rem; } .rightsContent img { margin-right: 1rem; height: 3rem; width: 3rem; } .rightsContent span { color: white; font-size: 1rem; } .footerBottomContainer { align-items: center; display: flex; flex-wrap: wrap; justify-content: center; margin: 0 auto; margin-bottom: 4rem; margin-top: 2rem; padding: 0; row-gap: 1rem; width: 80%; } .footerBottomContainer a { color: white; font-size: 0.8rem; margin: 0 0.5rem; text-decoration: none; } #icon-id09442304857232617 { color: white; cursor: pointer; font-size: 0.8rem; margin: 0; text-decoration: none; } .footerBottomContainer a:hover { color: white; cursor: pointer; font-size: 0.8rem; text-decoration: underline; } @media (max-width: 1100px) { .mainContent { grid-template-columns: repeat(3, 1fr); grid-row-gap: 2em; } } @media (max-width: 750px) { .mainContent { grid-template-columns: repeat(2, 1fr); grid-row-gap: 2rem; } } @media (max-width: 450px) { .mainContent { grid-template-columns: repeat(1, 1fr); grid-row-gap: 2rem; } } \u003c/style\u003e \u003cdiv class=\"betaFooter\"\u003e \u003cdiv class=\"colorBar\"\u003e \u003cdiv class=\"colorContainer\" style=\"background: #F29A36; width: 13%;\"\u003e\u0026nbsp;\u003c/div\u003e \u003cdiv class=\"colorContainer\" style=\"background: #E4002B; width: 39%;\"\u003e\u0026nbsp;\u003c/div\u003e \u003cdiv class=\"colorContainer\" style=\"background: #AB2782; width: 13%;\"\u003e\u0026nbsp;\u003c/div\u003e \u003cdiv class=\"colorContainer\" style=\"background: #0E41AA; width: 25%;\"\u003e\u0026nbsp;\u003c/div\u003e \u003cdiv class=\"colorContainer\" style=\"background: #4A1968; width: 10%;\"\u003e\u0026nbsp;\u003c/div\u003e \u003c/div\u003e \u003cdiv class=\"mainContent\"\u003e \u003cdiv class=\"linkContainer\"\u003e \u003ch3 class=\"linkContainerTitle\"\u003eABOUT DEVCENTRAL\u003c/h3\u003e \u003ca class=\"linkItem\" href=\"https://community.f5.com/category/Articles/kb/DevCentralNews\" target=\"_blank\" rel=\"noopener\"\u003eDevCentral News\u003c/a\u003e \u003ca class=\"linkItem\" href=\"https://community.f5.com/category/Forums/discussions/TechnicalForum\" target=\"_blank\" rel=\"noopener\"\u003eTechnical Forum\u003c/a\u003e \u003ca class=\"linkItem\" href=\"https://community.f5.com/category/Articles/kb/TechnicalArticles\" target=\"_blank\" rel=\"noopener\"\u003eTechnical Articles\u003c/a\u003e \u003ca class=\"linkItem\" href=\"https://community.f5.com/category/CrowdSRC\" target=\"_blank\" rel=\"noopener\"\u003eTechnical CrowdSRC\u003c/a\u003e \u003ca class=\"linkItem\" href=\"https://community.f5.com/t5/devcentral-news/devcentral-community-guidelines/ta-p/291537\" target=\"_blank\" rel=\"noopener\"\u003eCommunity Guidelines\u003c/a\u003e \u003ca class=\"linkItem\" href=\"https://community.f5.com/t5/devcentral-news/devcentral-end-user-license-agreement/ta-p/291544\" target=\"_blank\" rel=\"noopener\"\u003eDevCentral EULA\u003c/a\u003e \u003ca class=\"linkItem\" href=\"https://community.f5.com/t5/technical-articles/how-to-get-a-f5-big-ip-ve-developer-lab-license/ta-p/279858\" target=\"_blank\" rel=\"noopener\"\u003eGet a Developer Lab License\u003c/a\u003e \u003ca class=\"linkItem\" href=\"https://community.f5.com/t5/devcentral-news/devcentral-mvp-program/ta-p/291570\" target=\"_blank\" rel=\"noopener\"\u003eBecome a DevCentral MVP\u003c/a\u003e \u003c/div\u003e \u003cdiv class=\"linkContainer\"\u003e \u003ch3 class=\"linkContainerTitle\"\u003eRESOURCES\u003c/h3\u003e \u003ca class=\"linkItem\" href=\"https://support.f5.com/csp/home\" target=\"_blank\" rel=\"noopener\"\u003eProduct Documentation\u003c/a\u003e \u003ca class=\"linkItem\" href=\"https://www.f5.com/services/resources/white-papers.html\" target=\"_blank\" rel=\"noopener\"\u003eWhite Papers\u003c/a\u003e \u003ca class=\"linkItem\" href=\"https://www.f5.com/glossary\" target=\"_blank\" rel=\"noopener\"\u003eGlossary\u003c/a\u003e \u003ca class=\"linkItem\" href=\"https://www.f5.com/customer-stories.html\" target=\"_blank\" rel=\"noopener\"\u003eCustomer Stories\u003c/a\u003e \u003ca class=\"linkItem\" href=\"https://www.f5.com/company/events/webinars\" target=\"_blank\" rel=\"noopener\"\u003eWebinars\u003c/a\u003e \u003ca class=\"linkItem\" href=\"https://www.f5.com/services/training/free-training-courses/getting-started-start-here.html\" target=\"_blank\" rel=\"noopener\"\u003eFree Online Courses\u003c/a\u003e \u003ca class=\"linkItem\" href=\"https://www.f5.com/services/certification.html\" target=\"_blank\" rel=\"noopener\"\u003eF5 Certification\u003c/a\u003e \u003ca class=\"linkItem\" href=\"https://www.f5.com/services/training.html\" target=\"_blank\" rel=\"noopener\"\u003eLearnF5 Training\u003c/a\u003e \u003c/div\u003e \u003cdiv class=\"linkContainer\"\u003e \u003ch3 class=\"linkContainerTitle\"\u003eSUPPORT\u003c/h3\u003e \u003ca class=\"linkItem\" href=\"https://account.f5.com/myf5\" target=\"_blank\" rel=\"noopener\"\u003eManage Subscriptions\u003c/a\u003e \u003ca class=\"linkItem\" href=\"https://www.f5.com/services/professional-services\" target=\"_blank\" rel=\"noopener\"\u003eProfessional Services\u003c/a\u003e \u003ca class=\"linkItem\" href=\"https://www.f5.com/services#professional-services\" target=\"_blank\" rel=\"noopener\"\u003eProfessional Services\u003c/a\u003e \u003ca class=\"linkItem\" href=\"https://my.f5.com/manage/s/\" target=\"_blank\" rel=\"noopener\"\u003eCreate a Service Request\u003c/a\u003e \u003ca class=\"linkItem\" href=\"https://login.f5.com/resource/login.jsp?ctx=719748\" target=\"_blank\" rel=\"noopener\"\u003eSoftware Downloads\u003c/a\u003e \u003ca class=\"linkItem\" href=\"https://my.f5.com/manage/s/\" target=\"_blank\" rel=\"noopener\"\u003eSupport Portal\u003c/a\u003e \u003c/div\u003e \u003cdiv class=\"linkContainer\"\u003e \u003ch3 class=\"linkContainerTitle\"\u003ePARTNERS\u003c/h3\u003e \u003ca class=\"linkItem\" href=\"https://www.f5.com/partners/find-a-partner\" target=\"_blank\" rel=\"noopener\"\u003eFind a Reseller Partner\u003c/a\u003e \u003ca class=\"linkItem\" href=\"https://www.f5.com/partners/technology-alliances\" target=\"_blank\" rel=\"noopener\"\u003eTechnology Alliances\u003c/a\u003e \u003ca class=\"linkItem\" href=\"https://www.f5.com/partners\" target=\"_blank\" rel=\"noopener\"\u003eBecome an F5 Partner\u003c/a\u003e \u003ca class=\"linkItem\" href=\"https://partnercentral.f5.com/\" target=\"_blank\" rel=\"noopener\"\u003eLogin to Partner Central\u003c/a\u003e \u003c/div\u003e \u003c/div\u003e \u003chr style=\"height: 2px; background: #666666; width: 89%;\"\u003e \u003cdiv class=\"rightsContent\"\u003e \u003cimg src=\"https://www.f5.com/content/dam/f5/f5-logo.svg\" alt=\"F5 logo\"\u003e \u003cspan\u003e©2024 F5, Inc. All rights reserved.\u003c/span\u003e \u003c/div\u003e \u003c/div\u003e \u003cdiv id=\"footerBottomCont\" class=\"footerBottomContainer\"\u003e \u003ca href=\"https://www.f5.com/company/policies/trademarks\"\u003eTrademarks\u003c/a\u003e \u003ca href=\"https://www.f5.com/company/policies\"\u003ePolicies\u003c/a\u003e \u003ca href=\"https://www.f5.com/company/policies/privacy-compliance-and-practices\"\u003ePrivacy\u003c/a\u003e \u003ca href=\"https://www.f5.com/company/policies/privacy-notice#ca\"\u003eCalifornia Privacy\u003c/a\u003e \u003ca href=\"https://privacyportal.onetrust.com/webform/86c88b66-1c6e-4a7d-8530-6d754439e01a/45381ea3-ec70-4d89-a08e-7633b8fdc40a\"\u003eDo Not Sell My Personal Information\u003c/a\u003e \u003c/div\u003e"}},"componentScriptGroups({\"componentId\":\"custom.widget.Beta_Footer\"})":{"__typename":"ComponentScriptGroups","scriptGroups":{"__typename":"ComponentScriptGroupsDefinition","afterInteractive":{"__typename":"PageScriptGroupDefinition","group":"AFTER_INTERACTIVE","scriptIds":[]},"lazyOnLoad":{"__typename":"PageScriptGroupDefinition","group":"LAZY_ON_LOAD","scriptIds":[]}},"componentScripts":[]},"component({\"componentId\":\"custom.widget.Tag_Manager_Helper\"})":{"__typename":"Component","render({\"context\":{\"component\":{\"entities\":[],\"props\":{}},\"page\":{\"entities\":[],\"name\":\"TagPage\",\"props\":{},\"url\":\"https://community.f5.com/tag/security\"}}})":{"__typename":"ComponentRenderResult","html":"\u003cscript async=\"async\" src=\"https://consent.trustarc.com/notice?domain=f5.com\u0026c=teconsent\u0026js=nj\u0026noticeType=bb\u0026text=true\u0026gtm=1\" crossorigin=\"\"\u003e\u003c/script\u003e \u003cscript src=\"https://mktg.tags.f5.com/devcentral/prod/utag.sync.js\"\u003e\u003c/script\u003e \u003cscript src=\"https://static.cloud.coveo.com/coveo.analytics.js/2/coveoua.js\"\u003e\u003c/script\u003e \u003cscript src=\"https://community.f5.com/t5/s/zihoc95639/m_assets/components/Tag_Manager_Helper/assets/gainsight-px.js?time=1726846717000\"\u003e\u003c/script\u003e \u003cscript src=\"https://community.f5.com/t5/s/zihoc95639/m_assets/components/Tag_Manager_Helper/assets/tealium-tag.js?time=1706727883000\"\u003e\u003c/script\u003e \u003cscript src=\"https://community.f5.com/t5/s/zihoc95639/m_assets/components/Tag_Manager_Helper/assets/coveo-script.js?time=1726162675000\"\u003e\u003c/script\u003e \u003cscript src=\"https://community.f5.com/t5/s/zihoc95639/m_assets/components/Tag_Manager_Helper/assets/trustarc-consent.js?time=1726846717000\"\u003e\u003c/script\u003e"}},"componentScriptGroups({\"componentId\":\"custom.widget.Tag_Manager_Helper\"})":{"__typename":"ComponentScriptGroups","scriptGroups":{"__typename":"ComponentScriptGroupsDefinition","afterInteractive":{"__typename":"PageScriptGroupDefinition","group":"AFTER_INTERACTIVE","scriptIds":[]},"lazyOnLoad":{"__typename":"PageScriptGroupDefinition","group":"LAZY_ON_LOAD","scriptIds":[]}},"componentScripts":[]},"component({\"componentId\":\"custom.widget.Consent_Blackbar\"})":{"__typename":"Component","render({\"context\":{\"component\":{\"entities\":[],\"props\":{}},\"page\":{\"entities\":[],\"name\":\"TagPage\",\"props\":{},\"url\":\"https://community.f5.com/tag/security\"}}})":{"__typename":"ComponentRenderResult","html":"\u003cDIV id=\"consent_blackbar\" style=\"position: fixed; top: 0px; width: 100%;\"\u003e\u003c/DIV\u003e"}},"componentScriptGroups({\"componentId\":\"custom.widget.Consent_Blackbar\"})":{"__typename":"ComponentScriptGroups","scriptGroups":{"__typename":"ComponentScriptGroupsDefinition","afterInteractive":{"__typename":"PageScriptGroupDefinition","group":"AFTER_INTERACTIVE","scriptIds":[]},"lazyOnLoad":{"__typename":"PageScriptGroupDefinition","group":"LAZY_ON_LOAD","scriptIds":[]}},"componentScripts":[]},"cachedText({\"lastModified\":\"1740415743150\",\"locale\":\"en-US\",\"namespaces\":[\"components/community/NavbarDropdownToggle\"]})":[{"__ref":"CachedAsset:text:en_US-components/community/NavbarDropdownToggle-1740415743150"}],"cachedText({\"lastModified\":\"1740415743150\",\"locale\":\"en-US\",\"namespaces\":[\"shared/client/components/common/OverflowNav\"]})":[{"__ref":"CachedAsset:text:en_US-shared/client/components/common/OverflowNav-1740415743150"}],"cachedText({\"lastModified\":\"1740415743150\",\"locale\":\"en-US\",\"namespaces\":[\"components/messages/MessageView/MessageViewInline\"]})":[{"__ref":"CachedAsset:text:en_US-components/messages/MessageView/MessageViewInline-1740415743150"}],"cachedText({\"lastModified\":\"1740415743150\",\"locale\":\"en-US\",\"namespaces\":[\"shared/client/components/common/Pager/PagerLoadMore\"]})":[{"__ref":"CachedAsset:text:en_US-shared/client/components/common/Pager/PagerLoadMore-1740415743150"}],"cachedText({\"lastModified\":\"1740415743150\",\"locale\":\"en-US\",\"namespaces\":[\"components/customComponent/CustomComponent\"]})":[{"__ref":"CachedAsset:text:en_US-components/customComponent/CustomComponent-1740415743150"}],"cachedText({\"lastModified\":\"1740415743150\",\"locale\":\"en-US\",\"namespaces\":[\"components/users/UserLink\"]})":[{"__ref":"CachedAsset:text:en_US-components/users/UserLink-1740415743150"}],"cachedText({\"lastModified\":\"1740415743150\",\"locale\":\"en-US\",\"namespaces\":[\"components/messages/MessageSubject\"]})":[{"__ref":"CachedAsset:text:en_US-components/messages/MessageSubject-1740415743150"}],"cachedText({\"lastModified\":\"1740415743150\",\"locale\":\"en-US\",\"namespaces\":[\"components/messages/MessageBody\"]})":[{"__ref":"CachedAsset:text:en_US-components/messages/MessageBody-1740415743150"}],"cachedText({\"lastModified\":\"1740415743150\",\"locale\":\"en-US\",\"namespaces\":[\"components/messages/MessageTime\"]})":[{"__ref":"CachedAsset:text:en_US-components/messages/MessageTime-1740415743150"}],"cachedText({\"lastModified\":\"1740415743150\",\"locale\":\"en-US\",\"namespaces\":[\"shared/client/components/nodes/NodeIcon\"]})":[{"__ref":"CachedAsset:text:en_US-shared/client/components/nodes/NodeIcon-1740415743150"}],"cachedText({\"lastModified\":\"1740415743150\",\"locale\":\"en-US\",\"namespaces\":[\"components/messages/MessageUnreadCount\"]})":[{"__ref":"CachedAsset:text:en_US-components/messages/MessageUnreadCount-1740415743150"}],"cachedText({\"lastModified\":\"1740415743150\",\"locale\":\"en-US\",\"namespaces\":[\"components/messages/MessageViewCount\"]})":[{"__ref":"CachedAsset:text:en_US-components/messages/MessageViewCount-1740415743150"}],"cachedText({\"lastModified\":\"1740415743150\",\"locale\":\"en-US\",\"namespaces\":[\"components/kudos/KudosCount\"]})":[{"__ref":"CachedAsset:text:en_US-components/kudos/KudosCount-1740415743150"}],"cachedText({\"lastModified\":\"1740415743150\",\"locale\":\"en-US\",\"namespaces\":[\"components/messages/MessageRepliesCount\"]})":[{"__ref":"CachedAsset:text:en_US-components/messages/MessageRepliesCount-1740415743150"}],"cachedText({\"lastModified\":\"1740415743150\",\"locale\":\"en-US\",\"namespaces\":[\"components/messages/MessageSolvedBadge\"]})":[{"__ref":"CachedAsset:text:en_US-components/messages/MessageSolvedBadge-1740415743150"}],"cachedText({\"lastModified\":\"1740415743150\",\"locale\":\"en-US\",\"namespaces\":[\"shared/client/components/users/UserAvatar\"]})":[{"__ref":"CachedAsset:text:en_US-shared/client/components/users/UserAvatar-1740415743150"}]},"CachedAsset:pages-1740169745983":{"__typename":"CachedAsset","id":"pages-1740169745983","value":[{"lastUpdatedTime":1740169745983,"localOverride":null,"page":{"id":"HowDoI.GetInvolved.MvpProgram","type":"COMMUNITY","urlPath":"/c/how-do-i/get-involved/mvp-program","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1740169745983,"localOverride":null,"page":{"id":"BlogViewAllPostsPage","type":"BLOG","urlPath":"/category/:categoryId/blog/:boardId/all-posts/(/:after|/:before)?","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1740169745983,"localOverride":null,"page":{"id":"CasePortalPage","type":"CASE_PORTAL","urlPath":"/caseportal","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1740169745983,"localOverride":null,"page":{"id":"CreateGroupHubPage","type":"GROUP_HUB","urlPath":"/groups/create","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1740169745983,"localOverride":null,"page":{"id":"CaseViewPage","type":"CASE_DETAILS","urlPath":"/case/:caseId/:caseNumber","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1740169745983,"localOverride":null,"page":{"id":"InboxPage","type":"COMMUNITY","urlPath":"/inbox","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1740169745983,"localOverride":null,"page":{"id":"HowDoI.GetInvolved.AdvocacyProgram","type":"COMMUNITY","urlPath":"/c/how-do-i/get-involved/advocacy-program","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1740169745983,"localOverride":null,"page":{"id":"HowDoI.GetHelp.NonCustomer","type":"COMMUNITY","urlPath":"/c/how-do-i/get-help/non-customer","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1740169745983,"localOverride":null,"page":{"id":"HelpFAQPage","type":"COMMUNITY","urlPath":"/help","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1740169745983,"localOverride":null,"page":{"id":"HowDoI.GetHelp.F5Customer","type":"COMMUNITY","urlPath":"/c/how-do-i/get-help/f5-customer","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1740169745983,"localOverride":null,"page":{"id":"IdeaMessagePage","type":"IDEA_POST","urlPath":"/idea/:boardId/:messageSubject/:messageId","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1740169745983,"localOverride":null,"page":{"id":"IdeaViewAllIdeasPage","type":"IDEA","urlPath":"/category/:categoryId/ideas/:boardId/all-ideas/(/:after|/:before)?","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1740169745983,"localOverride":null,"page":{"id":"LoginPage","type":"USER","urlPath":"/signin","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1740169745983,"localOverride":null,"page":{"id":"BlogPostPage","type":"BLOG","urlPath":"/category/:categoryId/blogs/:boardId/create","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1740169745983,"localOverride":null,"page":{"id":"HowDoI.GetInvolved","type":"COMMUNITY","urlPath":"/c/how-do-i/get-involved","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1740169745983,"localOverride":null,"page":{"id":"HowDoI.Learn","type":"COMMUNITY","urlPath":"/c/how-do-i/learn","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1739501733000,"localOverride":null,"page":{"id":"Test","type":"CUSTOM","urlPath":"/custom-test-2","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1740169745983,"localOverride":null,"page":{"id":"ThemeEditorPage","type":"COMMUNITY","urlPath":"/designer/themes","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1740169745983,"localOverride":null,"page":{"id":"TkbViewAllArticlesPage","type":"TKB","urlPath":"/category/:categoryId/kb/:boardId/all-articles/(/:after|/:before)?","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1740169745983,"localOverride":null,"page":{"id":"OccasionEditPage","type":"EVENT","urlPath":"/event/:boardId/:messageSubject/:messageId/edit","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1740169745983,"localOverride":null,"page":{"id":"OAuthAuthorizationAllowPage","type":"USER","urlPath":"/auth/authorize/allow","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1740169745983,"localOverride":null,"page":{"id":"PageEditorPage","type":"COMMUNITY","urlPath":"/designer/pages","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1740169745983,"localOverride":null,"page":{"id":"PostPage","type":"COMMUNITY","urlPath":"/category/:categoryId/:boardId/create","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1740169745983,"localOverride":null,"page":{"id":"ForumBoardPage","type":"FORUM","urlPath":"/category/:categoryId/discussions/:boardId","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1740169745983,"localOverride":null,"page":{"id":"TkbBoardPage","type":"TKB","urlPath":"/category/:categoryId/kb/:boardId","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1740169745983,"localOverride":null,"page":{"id":"EventPostPage","type":"EVENT","urlPath":"/category/:categoryId/events/:boardId/create","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1740169745983,"localOverride":null,"page":{"id":"UserBadgesPage","type":"COMMUNITY","urlPath":"/users/:login/:userId/badges","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1740169745983,"localOverride":null,"page":{"id":"GroupHubMembershipAction","type":"GROUP_HUB","urlPath":"/membership/join/:nodeId/:membershipType","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1740169745983,"localOverride":null,"page":{"id":"MaintenancePage","type":"COMMUNITY","urlPath":"/maintenance","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1740169745983,"localOverride":null,"page":{"id":"IdeaReplyPage","type":"IDEA_REPLY","urlPath":"/idea/:boardId/:messageSubject/:messageId/comments/:replyId","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1740169745983,"localOverride":null,"page":{"id":"UserSettingsPage","type":"USER","urlPath":"/mysettings/:userSettingsTab","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1740169745983,"localOverride":null,"page":{"id":"GroupHubsPage","type":"GROUP_HUB","urlPath":"/groups","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1740169745983,"localOverride":null,"page":{"id":"ForumPostPage","type":"FORUM","urlPath":"/category/:categoryId/discussions/:boardId/create","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1740169745983,"localOverride":null,"page":{"id":"OccasionRsvpActionPage","type":"OCCASION","urlPath":"/event/:boardId/:messageSubject/:messageId/rsvp/:responseType","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1740169745983,"localOverride":null,"page":{"id":"VerifyUserEmailPage","type":"USER","urlPath":"/verifyemail/:userId/:verifyEmailToken","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1740169745983,"localOverride":null,"page":{"id":"AllOccasionsPage","type":"OCCASION","urlPath":"/category/:categoryId/events/:boardId/all-events/(/:after|/:before)?","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1740169745983,"localOverride":null,"page":{"id":"EventBoardPage","type":"EVENT","urlPath":"/category/:categoryId/events/:boardId","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1740169745983,"localOverride":null,"page":{"id":"TkbReplyPage","type":"TKB_REPLY","urlPath":"/kb/:boardId/:messageSubject/:messageId/comments/:replyId","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1740169745983,"localOverride":null,"page":{"id":"IdeaBoardPage","type":"IDEA","urlPath":"/category/:categoryId/ideas/:boardId","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1740169745983,"localOverride":null,"page":{"id":"CommunityGuideLinesPage","type":"COMMUNITY","urlPath":"/communityguidelines","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1740169745983,"localOverride":null,"page":{"id":"CaseCreatePage","type":"SALESFORCE_CASE_CREATION","urlPath":"/caseportal/create","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1740169745983,"localOverride":null,"page":{"id":"TkbEditPage","type":"TKB","urlPath":"/kb/:boardId/:messageSubject/:messageId/edit","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1740169745983,"localOverride":null,"page":{"id":"ForgotPasswordPage","type":"USER","urlPath":"/forgotpassword","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1740169745983,"localOverride":null,"page":{"id":"IdeaEditPage","type":"IDEA","urlPath":"/idea/:boardId/:messageSubject/:messageId/edit","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1740169745983,"localOverride":null,"page":{"id":"TagPage","type":"COMMUNITY","urlPath":"/tag/:tagName","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1740169745983,"localOverride":null,"page":{"id":"BlogBoardPage","type":"BLOG","urlPath":"/category/:categoryId/blog/:boardId","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1740169745983,"localOverride":null,"page":{"id":"OccasionMessagePage","type":"OCCASION_TOPIC","urlPath":"/event/:boardId/:messageSubject/:messageId","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1740169745983,"localOverride":null,"page":{"id":"ManageContentPage","type":"COMMUNITY","urlPath":"/managecontent","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1740169745983,"localOverride":null,"page":{"id":"ClosedMembershipNodeNonMembersPage","type":"GROUP_HUB","urlPath":"/closedgroup/:groupHubId","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1740169745983,"localOverride":null,"page":{"id":"HowDoI.GetHelp.Community","type":"COMMUNITY","urlPath":"/c/how-do-i/get-help/community","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1740169745983,"localOverride":null,"page":{"id":"CommunityPage","type":"COMMUNITY","urlPath":"/","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1740169745983,"localOverride":null,"page":{"id":"HowDoI.GetInvolved.ContributeCode","type":"COMMUNITY","urlPath":"/c/how-do-i/get-involved/contribute-code","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1740169745983,"localOverride":null,"page":{"id":"ForumMessagePage","type":"FORUM_TOPIC","urlPath":"/discussions/:boardId/:messageSubject/:messageId","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1740169745983,"localOverride":null,"page":{"id":"IdeaPostPage","type":"IDEA","urlPath":"/category/:categoryId/ideas/:boardId/create","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1740169745983,"localOverride":null,"page":{"id":"BlogMessagePage","type":"BLOG_ARTICLE","urlPath":"/blog/:boardId/:messageSubject/:messageId","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1740169745983,"localOverride":null,"page":{"id":"RegistrationPage","type":"USER","urlPath":"/register","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1740169745983,"localOverride":null,"page":{"id":"EditGroupHubPage","type":"GROUP_HUB","urlPath":"/group/:groupHubId/edit","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1740169745983,"localOverride":null,"page":{"id":"ForumEditPage","type":"FORUM","urlPath":"/discussions/:boardId/:messageSubject/:messageId/edit","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1740169745983,"localOverride":null,"page":{"id":"ResetPasswordPage","type":"USER","urlPath":"/resetpassword/:userId/:resetPasswordToken","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1740169745983,"localOverride":null,"page":{"id":"TkbMessagePage","type":"TKB_ARTICLE","urlPath":"/kb/:boardId/:messageSubject/:messageId","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1740169745983,"localOverride":null,"page":{"id":"HowDoI.Learn.AboutIrules","type":"COMMUNITY","urlPath":"/c/how-do-i/learn/about-irules","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1740169745983,"localOverride":null,"page":{"id":"BlogEditPage","type":"BLOG","urlPath":"/blog/:boardId/:messageSubject/:messageId/edit","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1740169745983,"localOverride":null,"page":{"id":"HowDoI.GetHelp.F5Support","type":"COMMUNITY","urlPath":"/c/how-do-i/get-help/f5-support","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1740169745983,"localOverride":null,"page":{"id":"ManageUsersPage","type":"USER","urlPath":"/users/manage/:tab?/:manageUsersTab?","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1740169745983,"localOverride":null,"page":{"id":"ForumReplyPage","type":"FORUM_REPLY","urlPath":"/discussions/:boardId/:messageSubject/:messageId/replies/:replyId","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1740169745983,"localOverride":null,"page":{"id":"PrivacyPolicyPage","type":"COMMUNITY","urlPath":"/privacypolicy","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1740169745983,"localOverride":null,"page":{"id":"NotificationPage","type":"COMMUNITY","urlPath":"/notifications","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1740169745983,"localOverride":null,"page":{"id":"UserPage","type":"USER","urlPath":"/users/:login/:userId","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1740169745983,"localOverride":null,"page":{"id":"OccasionReplyPage","type":"OCCASION_REPLY","urlPath":"/event/:boardId/:messageSubject/:messageId/comments/:replyId","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1740169745983,"localOverride":null,"page":{"id":"ManageMembersPage","type":"GROUP_HUB","urlPath":"/group/:groupHubId/manage/:tab?","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1740169745983,"localOverride":null,"page":{"id":"SearchResultsPage","type":"COMMUNITY","urlPath":"/search","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1740169745983,"localOverride":null,"page":{"id":"BlogReplyPage","type":"BLOG_REPLY","urlPath":"/blog/:boardId/:messageSubject/:messageId/replies/:replyId","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1740169745983,"localOverride":null,"page":{"id":"GroupHubPage","type":"GROUP_HUB","urlPath":"/group/:groupHubId","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1740169745983,"localOverride":null,"page":{"id":"TermsOfServicePage","type":"COMMUNITY","urlPath":"/termsofservice","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1740169745983,"localOverride":null,"page":{"id":"HowDoI.GetHelp","type":"COMMUNITY","urlPath":"/c/how-do-i/get-help","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1740169745983,"localOverride":null,"page":{"id":"HowDoI.GetHelp.SecurityIncident","type":"COMMUNITY","urlPath":"/c/how-do-i/get-help/security-incident","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1740169745983,"localOverride":null,"page":{"id":"CategoryPage","type":"CATEGORY","urlPath":"/category/:categoryId","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1740169745983,"localOverride":null,"page":{"id":"ForumViewAllTopicsPage","type":"FORUM","urlPath":"/category/:categoryId/discussions/:boardId/all-topics/(/:after|/:before)?","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1740169745983,"localOverride":null,"page":{"id":"TkbPostPage","type":"TKB","urlPath":"/category/:categoryId/kbs/:boardId/create","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1740169745983,"localOverride":null,"page":{"id":"GroupHubPostPage","type":"GROUP_HUB","urlPath":"/group/:groupHubId/:boardId/create","__typename":"PageDescriptor"},"__typename":"PageResource"},{"lastUpdatedTime":1740169745983,"localOverride":null,"page":{"id":"HowDoI","type":"COMMUNITY","urlPath":"/c/how-do-i","__typename":"PageDescriptor"},"__typename":"PageResource"}],"localOverride":false},"CachedAsset:text:en_US-components/context/AppContext/AppContextProvider-0":{"__typename":"CachedAsset","id":"text:en_US-components/context/AppContext/AppContextProvider-0","value":{"noCommunity":"Cannot find community","noUser":"Cannot find current user","noNode":"Cannot find node with id {nodeId}","noMessage":"Cannot find message with id {messageId}"},"localOverride":false},"CachedAsset:text:en_US-shared/client/components/common/Loading/LoadingDot-0":{"__typename":"CachedAsset","id":"text:en_US-shared/client/components/common/Loading/LoadingDot-0","value":{"title":"Loading..."},"localOverride":false},"User:user:-1":{"__typename":"User","id":"user:-1","uid":-1,"login":"Former Member","email":"","avatar":null,"rank":null,"kudosWeight":1,"registrationData":{"__typename":"RegistrationData","status":"ANONYMOUS","registrationTime":null,"confirmEmailStatus":false,"registrationAccessLevel":"VIEW","ssoRegistrationFields":[]},"ssoId":null,"profileSettings":{"__typename":"ProfileSettings","dateDisplayStyle":{"__typename":"InheritableStringSettingWithPossibleValues","key":"layout.friendly_dates_enabled","value":"false","localValue":"true","possibleValues":["true","false"]},"dateDisplayFormat":{"__typename":"InheritableStringSetting","key":"layout.format_pattern_date","value":"dd-MMM-yyyy","localValue":"MM-dd-yyyy"},"language":{"__typename":"InheritableStringSettingWithPossibleValues","key":"profile.language","value":"en-US","localValue":"en","possibleValues":["en-US"]}},"deleted":false},"Theme:customTheme1":{"__typename":"Theme","id":"customTheme1"},"CachedAsset:theme:customTheme1-1740169745569":{"__typename":"CachedAsset","id":"theme:customTheme1-1740169745569","value":{"id":"customTheme1","animation":{"fast":"150ms","normal":"250ms","slow":"500ms","slowest":"750ms","function":"cubic-bezier(0.07, 0.91, 0.51, 1)","__typename":"AnimationThemeSettings"},"avatar":{"borderRadius":"50%","collections":["custom"],"__typename":"AvatarThemeSettings"},"basics":{"browserIcon":{"imageAssetName":"JimmyPackets-512-1702592938213.png","imageLastModified":"1702592945815","__typename":"ThemeAsset"},"customerLogo":{"imageAssetName":"f5_logo_fix-1704824537976.svg","imageLastModified":"1704824540697","__typename":"ThemeAsset"},"maximumWidthOfPageContent":"1600px","oneColumnNarrowWidth":"800px","gridGutterWidthMd":"30px","gridGutterWidthXs":"10px","pageWidthStyle":"WIDTH_OF_PAGE_CONTENT","__typename":"BasicsThemeSettings"},"buttons":{"borderRadiusSm":"5px","borderRadius":"5px","borderRadiusLg":"5px","paddingY":"5px","paddingYLg":"7px","paddingYHero":"var(--lia-bs-btn-padding-y-lg)","paddingX":"12px","paddingXLg":"14px","paddingXHero":"42px","fontStyle":"NORMAL","fontWeight":"400","textTransform":"NONE","disabledOpacity":0.5,"primaryTextColor":"var(--lia-bs-white)","primaryTextHoverColor":"var(--lia-bs-white)","primaryTextActiveColor":"var(--lia-bs-white)","primaryBgColor":"var(--lia-bs-primary)","primaryBgHoverColor":"hsl(var(--lia-bs-primary-h), var(--lia-bs-primary-s), calc(var(--lia-bs-primary-l) * 0.85))","primaryBgActiveColor":"hsl(var(--lia-bs-primary-h), var(--lia-bs-primary-s), calc(var(--lia-bs-primary-l) * 0.7))","primaryBorder":"1px solid transparent","primaryBorderHover":"1px solid transparent","primaryBorderActive":"1px solid transparent","primaryBorderFocus":"1px solid var(--lia-bs-white)","primaryBoxShadowFocus":"0 0 0 1px var(--lia-bs-primary), 0 0 0 4px hsla(var(--lia-bs-primary-h), var(--lia-bs-primary-s), var(--lia-bs-primary-l), 0.2)","secondaryTextColor":"var(--lia-bs-gray-900)","secondaryTextHoverColor":"hsl(var(--lia-bs-gray-900-h), var(--lia-bs-gray-900-s), calc(var(--lia-bs-gray-900-l) * 0.95))","secondaryTextActiveColor":"hsl(var(--lia-bs-gray-900-h), var(--lia-bs-gray-900-s), calc(var(--lia-bs-gray-900-l) * 0.9))","secondaryBgColor":"var(--lia-bs-gray-400)","secondaryBgHoverColor":"hsl(var(--lia-bs-gray-400-h), var(--lia-bs-gray-400-s), calc(var(--lia-bs-gray-400-l) * 0.96))","secondaryBgActiveColor":"hsl(var(--lia-bs-gray-400-h), var(--lia-bs-gray-400-s), calc(var(--lia-bs-gray-400-l) * 0.92))","secondaryBorder":"1px solid transparent","secondaryBorderHover":"1px solid transparent","secondaryBorderActive":"1px solid transparent","secondaryBorderFocus":"1px solid transparent","secondaryBoxShadowFocus":"0 0 0 1px var(--lia-bs-primary), 0 0 0 4px hsla(var(--lia-bs-primary-h), var(--lia-bs-primary-s), var(--lia-bs-primary-l), 0.2)","tertiaryTextColor":"var(--lia-bs-gray-900)","tertiaryTextHoverColor":"hsl(var(--lia-bs-gray-900-h), var(--lia-bs-gray-900-s), calc(var(--lia-bs-gray-900-l) * 0.95))","tertiaryTextActiveColor":"hsl(var(--lia-bs-gray-900-h), var(--lia-bs-gray-900-s), calc(var(--lia-bs-gray-900-l) * 0.9))","tertiaryBgColor":"transparent","tertiaryBgHoverColor":"transparent","tertiaryBgActiveColor":"hsla(var(--lia-bs-black-h), var(--lia-bs-black-s), var(--lia-bs-black-l), 0.04)","tertiaryBorder":"1px solid transparent","tertiaryBorderHover":"1px solid hsla(var(--lia-bs-black-h), var(--lia-bs-black-s), var(--lia-bs-black-l), 0.08)","tertiaryBorderActive":"1px solid transparent","tertiaryBorderFocus":"1px solid transparent","tertiaryBoxShadowFocus":"0 0 0 1px var(--lia-bs-primary), 0 0 0 4px hsla(var(--lia-bs-primary-h), var(--lia-bs-primary-s), var(--lia-bs-primary-l), 0.2)","destructiveTextColor":"var(--lia-bs-danger)","destructiveTextHoverColor":"hsl(var(--lia-bs-danger-h), var(--lia-bs-danger-s), calc(var(--lia-bs-danger-l) * 0.95))","destructiveTextActiveColor":"hsl(var(--lia-bs-danger-h), var(--lia-bs-danger-s), calc(var(--lia-bs-danger-l) * 0.9))","destructiveBgColor":"var(--lia-bs-gray-300)","destructiveBgHoverColor":"hsl(var(--lia-bs-gray-300-h), var(--lia-bs-gray-300-s), calc(var(--lia-bs-gray-300-l) * 0.96))","destructiveBgActiveColor":"hsl(var(--lia-bs-gray-300-h), var(--lia-bs-gray-300-s), calc(var(--lia-bs-gray-300-l) * 0.92))","destructiveBorder":"1px solid transparent","destructiveBorderHover":"1px solid transparent","destructiveBorderActive":"1px solid transparent","destructiveBorderFocus":"1px solid transparent","destructiveBoxShadowFocus":"0 0 0 1px var(--lia-bs-primary), 0 0 0 4px hsla(var(--lia-bs-primary-h), var(--lia-bs-primary-s), var(--lia-bs-primary-l), 0.2)","__typename":"ButtonsThemeSettings"},"border":{"color":"hsla(var(--lia-bs-black-h), var(--lia-bs-black-s), var(--lia-bs-black-l), 0.08)","mainContent":"NONE","sideContent":"NONE","radiusSm":"3px","radius":"5px","radiusLg":"9px","radius50":"100vw","__typename":"BorderThemeSettings"},"boxShadow":{"xs":"0 0 0 1px hsla(var(--lia-bs-gray-900-h), var(--lia-bs-gray-900-s), var(--lia-bs-gray-900-l), 0.08), 0 3px 0 -1px hsla(var(--lia-bs-gray-900-h), var(--lia-bs-gray-900-s), var(--lia-bs-gray-900-l), 0.08)","sm":"0 2px 4px hsla(var(--lia-bs-gray-900-h), var(--lia-bs-gray-900-s), var(--lia-bs-gray-900-l), 0.06)","md":"0 5px 15px hsla(var(--lia-bs-gray-900-h), var(--lia-bs-gray-900-s), var(--lia-bs-gray-900-l), 0.15)","lg":"0 10px 30px hsla(var(--lia-bs-gray-900-h), var(--lia-bs-gray-900-s), var(--lia-bs-gray-900-l), 0.15)","__typename":"BoxShadowThemeSettings"},"cards":{"bgColor":"var(--lia-panel-bg-color)","borderRadius":"var(--lia-panel-border-radius)","boxShadow":"var(--lia-box-shadow-xs)","__typename":"CardsThemeSettings"},"chip":{"maxWidth":"300px","height":"30px","__typename":"ChipThemeSettings"},"coreTypes":{"defaultMessageLinkColor":"var(--lia-bs-primary)","defaultMessageLinkDecoration":"none","defaultMessageLinkFontStyle":"NORMAL","defaultMessageLinkFontWeight":"400","defaultMessageFontStyle":"NORMAL","defaultMessageFontWeight":"400","forumColor":"#0C5C8D","forumFontFamily":"var(--lia-bs-font-family-base)","forumFontWeight":"var(--lia-default-message-font-weight)","forumLineHeight":"var(--lia-bs-line-height-base)","forumFontStyle":"var(--lia-default-message-font-style)","forumMessageLinkColor":"var(--lia-default-message-link-color)","forumMessageLinkDecoration":"var(--lia-default-message-link-decoration)","forumMessageLinkFontStyle":"var(--lia-default-message-link-font-style)","forumMessageLinkFontWeight":"var(--lia-default-message-link-font-weight)","forumSolvedColor":"#62C026","blogColor":"#730015","blogFontFamily":"var(--lia-bs-font-family-base)","blogFontWeight":"var(--lia-default-message-font-weight)","blogLineHeight":"1.75","blogFontStyle":"var(--lia-default-message-font-style)","blogMessageLinkColor":"var(--lia-default-message-link-color)","blogMessageLinkDecoration":"var(--lia-default-message-link-decoration)","blogMessageLinkFontStyle":"var(--lia-default-message-link-font-style)","blogMessageLinkFontWeight":"var(--lia-default-message-link-font-weight)","tkbColor":"#C20025","tkbFontFamily":"var(--lia-bs-font-family-base)","tkbFontWeight":"var(--lia-default-message-font-weight)","tkbLineHeight":"1.75","tkbFontStyle":"var(--lia-default-message-font-style)","tkbMessageLinkColor":"var(--lia-default-message-link-color)","tkbMessageLinkDecoration":"var(--lia-default-message-link-decoration)","tkbMessageLinkFontStyle":"var(--lia-default-message-link-font-style)","tkbMessageLinkFontWeight":"var(--lia-default-message-link-font-weight)","qandaColor":"#4099E2","qandaFontFamily":"var(--lia-bs-font-family-base)","qandaFontWeight":"var(--lia-default-message-font-weight)","qandaLineHeight":"var(--lia-bs-line-height-base)","qandaFontStyle":"var(--lia-default-message-link-font-style)","qandaMessageLinkColor":"var(--lia-default-message-link-color)","qandaMessageLinkDecoration":"var(--lia-default-message-link-decoration)","qandaMessageLinkFontStyle":"var(--lia-default-message-link-font-style)","qandaMessageLinkFontWeight":"var(--lia-default-message-link-font-weight)","qandaSolvedColor":"#3FA023","ideaColor":"#F3704B","ideaFontFamily":"var(--lia-bs-font-family-base)","ideaFontWeight":"var(--lia-default-message-font-weight)","ideaLineHeight":"var(--lia-bs-line-height-base)","ideaFontStyle":"var(--lia-default-message-font-style)","ideaMessageLinkColor":"var(--lia-default-message-link-color)","ideaMessageLinkDecoration":"var(--lia-default-message-link-decoration)","ideaMessageLinkFontStyle":"var(--lia-default-message-link-font-style)","ideaMessageLinkFontWeight":"var(--lia-default-message-link-font-weight)","contestColor":"#FCC845","contestFontFamily":"var(--lia-bs-font-family-base)","contestFontWeight":"var(--lia-default-message-font-weight)","contestLineHeight":"var(--lia-bs-line-height-base)","contestFontStyle":"var(--lia-default-message-link-font-style)","contestMessageLinkColor":"var(--lia-default-message-link-color)","contestMessageLinkDecoration":"var(--lia-default-message-link-decoration)","contestMessageLinkFontStyle":"ITALIC","contestMessageLinkFontWeight":"var(--lia-default-message-link-font-weight)","occasionColor":"#EE4B5B","occasionFontFamily":"var(--lia-bs-font-family-base)","occasionFontWeight":"var(--lia-default-message-font-weight)","occasionLineHeight":"var(--lia-bs-line-height-base)","occasionFontStyle":"var(--lia-default-message-font-style)","occasionMessageLinkColor":"var(--lia-default-message-link-color)","occasionMessageLinkDecoration":"var(--lia-default-message-link-decoration)","occasionMessageLinkFontStyle":"var(--lia-default-message-link-font-style)","occasionMessageLinkFontWeight":"var(--lia-default-message-link-font-weight)","grouphubColor":"#491B62","categoryColor":"#949494","communityColor":"#FFFFFF","productColor":"#949494","__typename":"CoreTypesThemeSettings"},"colors":{"black":"#000000","white":"#FFFFFF","gray100":"#F7F7F7","gray200":"#F7F7F7","gray300":"#E8E8E8","gray400":"#D9D9D9","gray500":"#CCCCCC","gray600":"#949494","gray700":"#707070","gray800":"#545454","gray900":"#333333","dark":"#545454","light":"#F7F7F7","primary":"#0C5C8D","secondary":"#333333","bodyText":"#222222","bodyBg":"#F5F5F5","info":"#1D9CD3","success":"#62C026","warning":"#FFD651","danger":"#C20025","alertSystem":"#FF6600","textMuted":"#707070","highlight":"#FFFCAD","outline":"var(--lia-bs-primary)","custom":["#C20025","#081B85","#009639","#B3C6D7","#7CC0EB","#F29A36"],"__typename":"ColorsThemeSettings"},"divider":{"size":"3px","marginLeft":"4px","marginRight":"4px","borderRadius":"50%","bgColor":"var(--lia-bs-gray-600)","bgColorActive":"var(--lia-bs-gray-600)","__typename":"DividerThemeSettings"},"dropdown":{"fontSize":"var(--lia-bs-font-size-sm)","borderColor":"var(--lia-bs-border-color)","borderRadius":"var(--lia-bs-border-radius-sm)","dividerBg":"var(--lia-bs-gray-300)","itemPaddingY":"5px","itemPaddingX":"20px","headerColor":"var(--lia-bs-gray-700)","__typename":"DropdownThemeSettings"},"email":{"link":{"color":"#0069D4","hoverColor":"#0061c2","decoration":"none","hoverDecoration":"underline","__typename":"EmailLinkSettings"},"border":{"color":"#e4e4e4","__typename":"EmailBorderSettings"},"buttons":{"borderRadiusLg":"5px","paddingXLg":"16px","paddingYLg":"7px","fontWeight":"700","primaryTextColor":"#ffffff","primaryTextHoverColor":"#ffffff","primaryBgColor":"#0069D4","primaryBgHoverColor":"#005cb8","primaryBorder":"1px solid transparent","primaryBorderHover":"1px solid transparent","__typename":"EmailButtonsSettings"},"panel":{"borderRadius":"5px","borderColor":"#e4e4e4","__typename":"EmailPanelSettings"},"__typename":"EmailThemeSettings"},"emoji":{"skinToneDefault":"#ffcd43","skinToneLight":"#fae3c5","skinToneMediumLight":"#e2cfa5","skinToneMedium":"#daa478","skinToneMediumDark":"#a78058","skinToneDark":"#5e4d43","__typename":"EmojiThemeSettings"},"heading":{"color":"var(--lia-bs-body-color)","fontFamily":"Inter","fontStyle":"NORMAL","fontWeight":"600","h1FontSize":"30px","h2FontSize":"25px","h3FontSize":"20px","h4FontSize":"18px","h5FontSize":"16px","h6FontSize":"16px","lineHeight":"1.2","subHeaderFontSize":"11px","subHeaderFontWeight":"500","h1LetterSpacing":"normal","h2LetterSpacing":"normal","h3LetterSpacing":"normal","h4LetterSpacing":"normal","h5LetterSpacing":"normal","h6LetterSpacing":"normal","subHeaderLetterSpacing":"2px","h1FontWeight":"var(--lia-bs-headings-font-weight)","h2FontWeight":"var(--lia-bs-headings-font-weight)","h3FontWeight":"var(--lia-bs-headings-font-weight)","h4FontWeight":"var(--lia-bs-headings-font-weight)","h5FontWeight":"var(--lia-bs-headings-font-weight)","h6FontWeight":"var(--lia-bs-headings-font-weight)","__typename":"HeadingThemeSettings"},"icons":{"size10":"10px","size12":"12px","size14":"14px","size16":"16px","size20":"20px","size24":"24px","size30":"30px","size40":"40px","size50":"50px","size60":"60px","size80":"80px","size120":"120px","size160":"160px","__typename":"IconsThemeSettings"},"imagePreview":{"bgColor":"var(--lia-bs-gray-900)","titleColor":"var(--lia-bs-white)","controlColor":"var(--lia-bs-white)","controlBgColor":"var(--lia-bs-gray-800)","__typename":"ImagePreviewThemeSettings"},"input":{"borderColor":"var(--lia-bs-gray-600)","disabledColor":"var(--lia-bs-gray-600)","focusBorderColor":"var(--lia-bs-primary)","labelMarginBottom":"10px","btnFontSize":"var(--lia-bs-font-size-sm)","focusBoxShadow":"0 0 0 3px hsla(var(--lia-bs-primary-h), var(--lia-bs-primary-s), var(--lia-bs-primary-l), 0.2)","checkLabelMarginBottom":"2px","checkboxBorderRadius":"3px","borderRadiusSm":"var(--lia-bs-border-radius-sm)","borderRadius":"var(--lia-bs-border-radius)","borderRadiusLg":"var(--lia-bs-border-radius-lg)","formTextMarginTop":"4px","textAreaBorderRadius":"var(--lia-bs-border-radius)","activeFillColor":"var(--lia-bs-primary)","__typename":"InputThemeSettings"},"loading":{"dotDarkColor":"hsla(var(--lia-bs-black-h), var(--lia-bs-black-s), var(--lia-bs-black-l), 0.2)","dotLightColor":"hsla(var(--lia-bs-white-h), var(--lia-bs-white-s), var(--lia-bs-white-l), 0.5)","barDarkColor":"hsla(var(--lia-bs-black-h), var(--lia-bs-black-s), var(--lia-bs-black-l), 0.06)","barLightColor":"hsla(var(--lia-bs-white-h), var(--lia-bs-white-s), var(--lia-bs-white-l), 0.4)","__typename":"LoadingThemeSettings"},"link":{"color":"var(--lia-bs-primary)","hoverColor":"hsl(var(--lia-bs-primary-h), var(--lia-bs-primary-s), calc(var(--lia-bs-primary-l) - 10%))","decoration":"none","hoverDecoration":"underline","__typename":"LinkThemeSettings"},"listGroup":{"itemPaddingY":"15px","itemPaddingX":"15px","borderColor":"var(--lia-bs-gray-300)","__typename":"ListGroupThemeSettings"},"modal":{"contentTextColor":"var(--lia-bs-body-color)","contentBg":"var(--lia-bs-white)","backgroundBg":"var(--lia-bs-black)","smSize":"440px","mdSize":"760px","lgSize":"1080px","backdropOpacity":0.3,"contentBoxShadowXs":"var(--lia-bs-box-shadow-sm)","contentBoxShadow":"var(--lia-bs-box-shadow)","headerFontWeight":"700","__typename":"ModalThemeSettings"},"navbar":{"position":"FIXED","background":{"attachment":null,"clip":null,"color":"var(--lia-bs-white)","imageAssetName":null,"imageLastModified":"0","origin":null,"position":"CENTER_CENTER","repeat":"NO_REPEAT","size":"COVER","__typename":"BackgroundProps"},"backgroundOpacity":0.8,"paddingTop":"15px","paddingBottom":"15px","borderBottom":"1px solid var(--lia-bs-border-color)","boxShadow":"var(--lia-bs-box-shadow-sm)","brandMarginRight":"30px","brandMarginRightSm":"10px","brandLogoHeight":"30px","linkGap":"10px","linkJustifyContent":"flex-start","linkPaddingY":"5px","linkPaddingX":"10px","linkDropdownPaddingY":"9px","linkDropdownPaddingX":"var(--lia-nav-link-px)","linkColor":"var(--lia-bs-body-color)","linkHoverColor":"var(--lia-bs-primary)","linkFontSize":"var(--lia-bs-font-size-sm)","linkFontStyle":"NORMAL","linkFontWeight":"400","linkTextTransform":"NONE","linkLetterSpacing":"normal","linkBorderRadius":"var(--lia-bs-border-radius-sm)","linkBgColor":"transparent","linkBgHoverColor":"transparent","linkBorder":"none","linkBorderHover":"none","linkBoxShadow":"none","linkBoxShadowHover":"none","linkTextBorderBottom":"none","linkTextBorderBottomHover":"none","dropdownPaddingTop":"10px","dropdownPaddingBottom":"15px","dropdownPaddingX":"10px","dropdownMenuOffset":"2px","dropdownDividerMarginTop":"10px","dropdownDividerMarginBottom":"10px","dropdownBorderColor":"hsla(var(--lia-bs-black-h), var(--lia-bs-black-s), var(--lia-bs-black-l), 0.08)","controllerBgHoverColor":"hsla(var(--lia-bs-black-h), var(--lia-bs-black-s), var(--lia-bs-black-l), 0.1)","controllerIconColor":"var(--lia-bs-body-color)","controllerIconHoverColor":"var(--lia-bs-body-color)","controllerTextColor":"var(--lia-nav-controller-icon-color)","controllerTextHoverColor":"var(--lia-nav-controller-icon-hover-color)","controllerHighlightColor":"hsla(30, 100%, 50%)","controllerHighlightTextColor":"var(--lia-yiq-light)","controllerBorderRadius":"var(--lia-border-radius-50)","hamburgerColor":"var(--lia-nav-controller-icon-color)","hamburgerHoverColor":"var(--lia-nav-controller-icon-color)","hamburgerBgColor":"transparent","hamburgerBgHoverColor":"transparent","hamburgerBorder":"none","hamburgerBorderHover":"none","collapseMenuMarginLeft":"20px","collapseMenuDividerBg":"var(--lia-nav-link-color)","collapseMenuDividerOpacity":0.16,"__typename":"NavbarThemeSettings"},"pager":{"textColor":"var(--lia-bs-link-color)","textFontWeight":"var(--lia-font-weight-md)","textFontSize":"var(--lia-bs-font-size-sm)","__typename":"PagerThemeSettings"},"panel":{"bgColor":"var(--lia-bs-white)","borderRadius":"var(--lia-bs-border-radius)","borderColor":"var(--lia-bs-border-color)","boxShadow":"none","__typename":"PanelThemeSettings"},"popover":{"arrowHeight":"8px","arrowWidth":"16px","maxWidth":"300px","minWidth":"100px","headerBg":"var(--lia-bs-white)","borderColor":"var(--lia-bs-border-color)","borderRadius":"var(--lia-bs-border-radius)","boxShadow":"0 0.5rem 1rem hsla(var(--lia-bs-black-h), var(--lia-bs-black-s), var(--lia-bs-black-l), 0.15)","__typename":"PopoverThemeSettings"},"prism":{"color":"#000000","bgColor":"#f5f2f0","fontFamily":"var(--font-family-monospace)","fontSize":"var(--lia-bs-font-size-base)","fontWeightBold":"var(--lia-bs-font-weight-bold)","fontStyleItalic":"italic","tabSize":2,"highlightColor":"#b3d4fc","commentColor":"#62707e","punctuationColor":"#6f6f6f","namespaceOpacity":"0.7","propColor":"#990055","selectorColor":"#517a00","operatorColor":"#906736","operatorBgColor":"hsla(0, 0%, 100%, 0.5)","keywordColor":"#0076a9","functionColor":"#d3284b","variableColor":"#c14700","__typename":"PrismThemeSettings"},"rte":{"bgColor":"var(--lia-bs-white)","borderRadius":"var(--lia-panel-border-radius)","boxShadow":" var(--lia-panel-box-shadow)","customColor1":"#bfedd2","customColor2":"#fbeeb8","customColor3":"#f8cac6","customColor4":"#eccafa","customColor5":"#c2e0f4","customColor6":"#2dc26b","customColor7":"#f1c40f","customColor8":"#e03e2d","customColor9":"#b96ad9","customColor10":"#3598db","customColor11":"#169179","customColor12":"#e67e23","customColor13":"#ba372a","customColor14":"#843fa1","customColor15":"#236fa1","customColor16":"#ecf0f1","customColor17":"#ced4d9","customColor18":"#95a5a6","customColor19":"#7e8c8d","customColor20":"#34495e","customColor21":"#000000","customColor22":"#ffffff","defaultMessageHeaderMarginTop":"14px","defaultMessageHeaderMarginBottom":"10px","defaultMessageItemMarginTop":"0","defaultMessageItemMarginBottom":"10px","diffAddedColor":"hsla(170, 53%, 51%, 0.4)","diffChangedColor":"hsla(43, 97%, 63%, 0.4)","diffNoneColor":"hsla(0, 0%, 80%, 0.4)","diffRemovedColor":"hsla(9, 74%, 47%, 0.4)","specialMessageHeaderMarginTop":"14px","specialMessageHeaderMarginBottom":"10px","specialMessageItemMarginTop":"0","specialMessageItemMarginBottom":"10px","__typename":"RteThemeSettings"},"tags":{"bgColor":"var(--lia-bs-gray-200)","bgHoverColor":"var(--lia-bs-gray-400)","borderRadius":"var(--lia-bs-border-radius-sm)","color":"var(--lia-bs-body-color)","hoverColor":"var(--lia-bs-body-color)","fontWeight":"var(--lia-font-weight-md)","fontSize":"var(--lia-font-size-xxs)","textTransform":"UPPERCASE","letterSpacing":"0.5px","__typename":"TagsThemeSettings"},"toasts":{"borderRadius":"var(--lia-bs-border-radius)","paddingX":"12px","__typename":"ToastsThemeSettings"},"typography":{"fontFamilyBase":"Atkinson Hyperlegible","fontStyleBase":"NORMAL","fontWeightBase":"400","fontWeightLight":"300","fontWeightNormal":"400","fontWeightMd":"500","fontWeightBold":"700","letterSpacingSm":"normal","letterSpacingXs":"normal","lineHeightBase":"1.3","fontSizeBase":"15px","fontSizeXxs":"11px","fontSizeXs":"12px","fontSizeSm":"13px","fontSizeLg":"20px","fontSizeXl":"24px","smallFontSize":"14px","customFonts":[],"__typename":"TypographyThemeSettings"},"unstyledListItem":{"marginBottomSm":"5px","marginBottomMd":"10px","marginBottomLg":"15px","marginBottomXl":"20px","marginBottomXxl":"25px","__typename":"UnstyledListItemThemeSettings"},"yiq":{"light":"#ffffff","dark":"#000000","__typename":"YiqThemeSettings"},"colorLightness":{"primaryDark":0.36,"primaryLight":0.74,"primaryLighter":0.89,"primaryLightest":0.95,"infoDark":0.39,"infoLight":0.72,"infoLighter":0.85,"infoLightest":0.93,"successDark":0.24,"successLight":0.62,"successLighter":0.8,"successLightest":0.91,"warningDark":0.39,"warningLight":0.68,"warningLighter":0.84,"warningLightest":0.93,"dangerDark":0.41,"dangerLight":0.72,"dangerLighter":0.89,"dangerLightest":0.95,"__typename":"ColorLightnessThemeSettings"},"localOverride":false,"__typename":"Theme"},"localOverride":false},"CachedAsset:text:en_US-components/common/EmailVerification-1740415743150":{"__typename":"CachedAsset","id":"text:en_US-components/common/EmailVerification-1740415743150","value":{"email.verification.title":"Email Verification Required","email.verification.message.update.email":"To participate in the community, you must first verify your email address. The verification email was sent to {email}. To change your email, visit \u003clink\u003eMy Settings\u003c/link\u003e.","email.verification.message.resend.email":"To participate in the community, you must first verify your email address. The verification email was sent to {email}. \u003clink\u003eResend email\u003c/link\u003e."},"localOverride":false},"CachedAsset:text:en_US-shared/client/components/common/Loading/LoadingDot-1740415743150":{"__typename":"CachedAsset","id":"text:en_US-shared/client/components/common/Loading/LoadingDot-1740415743150","value":{"title":"Loading..."},"localOverride":false},"CachedAsset:text:en_US-pages/tags/TagPage-1740415743150":{"__typename":"CachedAsset","id":"text:en_US-pages/tags/TagPage-1740415743150","value":{"tagPageTitle":"Tag:\"{tagName}\" | {communityTitle}","tagPageForNodeTitle":"Tag:\"{tagName}\" in \"{title}\" | {communityTitle}","name":"Tags Page","tag":"Tag: {tagName}"},"localOverride":false},"CachedAsset:quilt:f5.prod:pages/tags/TagPage:community:zihoc95639-1740169743882":{"__typename":"CachedAsset","id":"quilt:f5.prod:pages/tags/TagPage:community:zihoc95639-1740169743882","value":{"id":"TagPage","container":{"id":"Common","headerProps":{"removeComponents":["community.widget.bannerWidget"],"__typename":"QuiltContainerSectionProps"},"items":[{"id":"tag-header-widget","layout":"ONE_COLUMN","bgColor":"var(--lia-bs-white)","showBorder":"BOTTOM","sectionEditLevel":"LOCKED","columnMap":{"main":[{"id":"tags.widget.TagsHeaderWidget","__typename":"QuiltComponent"}],"__typename":"OneSectionColumns"},"__typename":"OneColumnQuiltSection"},{"id":"messages-list-for-tag-widget","layout":"ONE_COLUMN","columnMap":{"main":[{"id":"messages.widget.messageListForNodeByRecentActivityWidget","props":{"viewVariant":{"type":"inline","props":{"useUnreadCount":true,"useViewCount":true,"useAuthorLogin":true,"clampBodyLines":3,"useAvatar":true,"useBoardIcon":false,"useKudosCount":true,"usePreviewMedia":true,"useTags":false,"useNode":true,"useNodeLink":true,"useTextBody":true,"truncateBodyLength":-1,"useBody":true,"useRepliesCount":true,"useSolvedBadge":true,"timeStampType":"conversation.lastPostingActivityTime","useMessageTimeLink":true,"clampSubjectLines":2}},"panelType":"divider","useTitle":false,"hideIfEmpty":false,"pagerVariant":{"type":"loadMore"},"style":"list","showTabs":true,"tabItemMap":{"default":{"mostRecent":true,"mostRecentUserContent":false,"newest":false},"additional":{"mostKudoed":true,"mostViewed":true,"mostReplies":false,"noReplies":false,"noSolutions":false,"solutions":false}}},"__typename":"QuiltComponent"}],"__typename":"OneSectionColumns"},"__typename":"OneColumnQuiltSection"}],"__typename":"QuiltContainer"},"__typename":"Quilt"},"localOverride":false},"CachedAsset:quiltWrapper:f5.prod:Common:1740415742930":{"__typename":"CachedAsset","id":"quiltWrapper:f5.prod:Common:1740415742930","value":{"id":"Common","header":{"backgroundImageProps":{"assetName":"header.jpg","backgroundSize":"COVER","backgroundRepeat":"NO_REPEAT","backgroundPosition":"LEFT_CENTER","lastModified":"1702932449000","__typename":"BackgroundImageProps"},"backgroundColor":"transparent","items":[{"id":"custom.widget.Beta_MetaNav","props":{"widgetVisibility":"signedInOrAnonymous","useTitle":true,"useBackground":false,"title":"","lazyLoad":false},"__typename":"QuiltComponent"},{"id":"community.widget.navbarWidget","props":{"showUserName":false,"showRegisterLink":true,"style":{"boxShadow":"var(--lia-bs-box-shadow-sm)","linkFontWeight":"700","controllerHighlightColor":"hsla(30, 100%, 50%)","dropdownDividerMarginBottom":"10px","hamburgerBorderHover":"none","linkFontSize":"15px","linkBoxShadowHover":"none","backgroundOpacity":0.4,"controllerBorderRadius":"var(--lia-border-radius-50)","hamburgerBgColor":"transparent","linkTextBorderBottom":"none","hamburgerColor":"var(--lia-nav-controller-icon-color)","brandLogoHeight":"48px","linkLetterSpacing":"normal","linkBgHoverColor":"transparent","collapseMenuDividerOpacity":0.16,"paddingBottom":"10px","dropdownPaddingBottom":"15px","dropdownMenuOffset":"2px","hamburgerBgHoverColor":"transparent","borderBottom":"0","hamburgerBorder":"none","dropdownPaddingX":"10px","brandMarginRightSm":"10px","linkBoxShadow":"none","linkJustifyContent":"center","linkColor":"var(--lia-bs-primary)","collapseMenuDividerBg":"var(--lia-nav-link-color)","dropdownPaddingTop":"10px","controllerHighlightTextColor":"var(--lia-yiq-dark)","background":{"imageAssetName":"","color":"var(--lia-bs-white)","size":"COVER","repeat":"NO_REPEAT","position":"CENTER_CENTER","imageLastModified":""},"linkBorderRadius":"var(--lia-bs-border-radius-sm)","linkHoverColor":"var(--lia-bs-primary)","position":"FIXED","linkBorder":"none","linkTextBorderBottomHover":"2px solid #0C5C8D","brandMarginRight":"30px","hamburgerHoverColor":"var(--lia-nav-controller-icon-color)","linkBorderHover":"none","collapseMenuMarginLeft":"20px","linkFontStyle":"NORMAL","linkPaddingX":"10px","paddingTop":"10px","linkPaddingY":"5px","linkTextTransform":"NONE","dropdownBorderColor":"hsla(var(--lia-bs-black-h), var(--lia-bs-black-s), var(--lia-bs-black-l), 0.08)","controllerBgHoverColor":"hsla(var(--lia-bs-black-h), var(--lia-bs-black-s), var(--lia-bs-black-l), 0.1)","linkDropdownPaddingX":"var(--lia-nav-link-px)","linkBgColor":"transparent","linkDropdownPaddingY":"9px","controllerIconColor":"#0C5C8D","dropdownDividerMarginTop":"10px","linkGap":"10px","controllerIconHoverColor":"#0C5C8D"},"links":{"sideLinks":[],"mainLinks":[{"children":[{"linkType":"INTERNAL","id":"migrated-link-1","params":{"boardId":"TechnicalForum","categoryId":"Forums"},"routeName":"ForumBoardPage"},{"linkType":"INTERNAL","id":"migrated-link-2","params":{"boardId":"WaterCooler","categoryId":"Forums"},"routeName":"ForumBoardPage"}],"linkType":"INTERNAL","id":"migrated-link-0","params":{"categoryId":"Forums"},"routeName":"CategoryPage"},{"children":[{"linkType":"INTERNAL","id":"migrated-link-4","params":{"boardId":"codeshare","categoryId":"CrowdSRC"},"routeName":"TkbBoardPage"},{"linkType":"INTERNAL","id":"migrated-link-5","params":{"boardId":"communityarticles","categoryId":"CrowdSRC"},"routeName":"TkbBoardPage"}],"linkType":"INTERNAL","id":"migrated-link-3","params":{"categoryId":"CrowdSRC"},"routeName":"CategoryPage"},{"children":[{"linkType":"INTERNAL","id":"migrated-link-7","params":{"boardId":"TechnicalArticles","categoryId":"Articles"},"routeName":"TkbBoardPage"},{"linkType":"INTERNAL","id":"article-series","params":{"boardId":"article-series","categoryId":"Articles"},"routeName":"TkbBoardPage"},{"linkType":"INTERNAL","id":"security-insights","params":{"boardId":"security-insights","categoryId":"Articles"},"routeName":"TkbBoardPage"},{"linkType":"INTERNAL","id":"migrated-link-8","params":{"boardId":"DevCentralNews","categoryId":"Articles"},"routeName":"TkbBoardPage"}],"linkType":"INTERNAL","id":"migrated-link-6","params":{"categoryId":"Articles"},"routeName":"CategoryPage"},{"children":[{"linkType":"INTERNAL","id":"migrated-link-10","params":{"categoryId":"CommunityGroups"},"routeName":"CategoryPage"},{"linkType":"INTERNAL","id":"migrated-link-11","params":{"categoryId":"F5-Groups"},"routeName":"CategoryPage"}],"linkType":"INTERNAL","id":"migrated-link-9","params":{"categoryId":"GroupsCategory"},"routeName":"CategoryPage"},{"children":[],"linkType":"INTERNAL","id":"migrated-link-12","params":{"boardId":"Events","categoryId":"top"},"routeName":"EventBoardPage"},{"children":[],"linkType":"INTERNAL","id":"migrated-link-13","params":{"boardId":"Suggestions","categoryId":"top"},"routeName":"IdeaBoardPage"},{"children":[],"linkType":"EXTERNAL","id":"Common-external-link","url":"https://community.f5.com/c/how-do-i","target":"SELF"}]},"className":"QuiltComponent_lia-component-edit-mode__lQ9Z6","showSearchIcon":false},"__typename":"QuiltComponent"},{"id":"community.widget.bannerWidget","props":{"backgroundColor":"transparent","visualEffects":{"showBottomBorder":false},"backgroundImageProps":{"backgroundSize":"COVER","backgroundPosition":"CENTER_CENTER","backgroundRepeat":"NO_REPEAT"},"fontColor":"#222222"},"__typename":"QuiltComponent"},{"id":"community.widget.breadcrumbWidget","props":{"backgroundColor":"var(--lia-bs-primary)","linkHighlightColor":"#FFFFFF","visualEffects":{"showBottomBorder":false},"backgroundOpacity":60,"linkTextColor":"#FFFFFF"},"__typename":"QuiltComponent"}],"__typename":"QuiltWrapperSection"},"footer":{"backgroundImageProps":{"assetName":null,"backgroundSize":"COVER","backgroundRepeat":"NO_REPEAT","backgroundPosition":"CENTER_CENTER","lastModified":null,"__typename":"BackgroundImageProps"},"backgroundColor":"var(--lia-bs-body-color)","items":[{"id":"custom.widget.Beta_Footer","props":{"widgetVisibility":"signedInOrAnonymous","useTitle":true,"useBackground":false,"title":"","lazyLoad":false},"__typename":"QuiltComponent"},{"id":"custom.widget.Tag_Manager_Helper","props":{"widgetVisibility":"signedInOrAnonymous","useTitle":true,"useBackground":false,"title":"","lazyLoad":false},"__typename":"QuiltComponent"},{"id":"custom.widget.Consent_Blackbar","props":{"widgetVisibility":"signedInOrAnonymous","useTitle":true,"useBackground":false,"title":"","lazyLoad":false},"__typename":"QuiltComponent"}],"__typename":"QuiltWrapperSection"},"__typename":"QuiltWrapper","localOverride":false},"localOverride":false},"CachedAsset:text:en_US-components/common/ActionFeedback-1740415743150":{"__typename":"CachedAsset","id":"text:en_US-components/common/ActionFeedback-1740415743150","value":{"joinedGroupHub.title":"Welcome","joinedGroupHub.message":"You are now a member of this group and are subscribed to updates.","groupHubInviteNotFound.title":"Invitation Not Found","groupHubInviteNotFound.message":"Sorry, we could not find your invitation to the group. The owner may have canceled the invite.","groupHubNotFound.title":"Group Not Found","groupHubNotFound.message":"The grouphub you tried to join does not exist. It may have been deleted.","existingGroupHubMember.title":"Already Joined","existingGroupHubMember.message":"You are already a member of this group.","accountLocked.title":"Account Locked","accountLocked.message":"Your account has been locked due to multiple failed attempts. Try again in {lockoutTime} minutes.","editedGroupHub.title":"Changes Saved","editedGroupHub.message":"Your group has been updated.","leftGroupHub.title":"Goodbye","leftGroupHub.message":"You are no longer a member of this group and will not receive future updates.","deletedGroupHub.title":"Deleted","deletedGroupHub.message":"The group has been deleted.","groupHubCreated.title":"Group Created","groupHubCreated.message":"{groupHubName} is ready to use","accountClosed.title":"Account Closed","accountClosed.message":"The account has been closed and you will now be redirected to the homepage","resetTokenExpired.title":"Reset Password Link has Expired","resetTokenExpired.message":"Try resetting your password again","invalidUrl.title":"Invalid URL","invalidUrl.message":"The URL you're using is not recognized. Verify your URL and try again.","accountClosedForUser.title":"Account Closed","accountClosedForUser.message":"{userName}'s account is closed","inviteTokenInvalid.title":"Invitation Invalid","inviteTokenInvalid.message":"Your invitation to the community has been canceled or expired.","inviteTokenError.title":"Invitation Verification Failed","inviteTokenError.message":"The url you are utilizing is not recognized. Verify your URL and try again","pageNotFound.title":"Access Denied","pageNotFound.message":"You do not have access to this area of the community or it doesn't exist","eventAttending.title":"Responded as Attending","eventAttending.message":"You'll be notified when there's new activity and reminded as the event approaches","eventInterested.title":"Responded as Interested","eventInterested.message":"You'll be notified when there's new activity and reminded as the event approaches","eventNotFound.title":"Event Not Found","eventNotFound.message":"The event you tried to respond to does not exist.","redirectToRelatedPage.title":"Showing Related Content","redirectToRelatedPageForBaseUsers.title":"Showing Related Content","redirectToRelatedPageForBaseUsers.message":"The content you are trying to access is archived","redirectToRelatedPage.message":"The content you are trying to access is archived","relatedUrl.archivalLink.flyoutMessage":"The content you are trying to access is archived \u003clink\u003eView Archived Content\u003c/link\u003e"},"localOverride":false},"CachedAsset:component:custom.widget.Beta_MetaNav-en-1740169766739":{"__typename":"CachedAsset","id":"component:custom.widget.Beta_MetaNav-en-1740169766739","value":{"component":{"id":"custom.widget.Beta_MetaNav","template":{"id":"Beta_MetaNav","markupLanguage":"HANDLEBARS","style":null,"texts":null,"defaults":{"config":{"applicablePages":[],"description":"MetaNav menu at the top of every page.","fetchedContent":null,"__typename":"ComponentConfiguration"},"props":[],"__typename":"ComponentProperties"},"components":[{"id":"custom.widget.Beta_MetaNav","form":null,"config":null,"props":[],"__typename":"Component"}],"grouping":"CUSTOM","__typename":"ComponentTemplate"},"properties":{"config":{"applicablePages":[],"description":"MetaNav menu at the top of every page.","fetchedContent":null,"__typename":"ComponentConfiguration"},"props":[],"__typename":"ComponentProperties"},"form":null,"__typename":"Component","localOverride":false},"globalCss":null,"form":null},"localOverride":false},"CachedAsset:component:custom.widget.Beta_Footer-en-1740169766739":{"__typename":"CachedAsset","id":"component:custom.widget.Beta_Footer-en-1740169766739","value":{"component":{"id":"custom.widget.Beta_Footer","template":{"id":"Beta_Footer","markupLanguage":"HANDLEBARS","style":null,"texts":null,"defaults":{"config":{"applicablePages":[],"description":"DevCentral´s custom footer.","fetchedContent":null,"__typename":"ComponentConfiguration"},"props":[],"__typename":"ComponentProperties"},"components":[{"id":"custom.widget.Beta_Footer","form":null,"config":null,"props":[],"__typename":"Component"}],"grouping":"CUSTOM","__typename":"ComponentTemplate"},"properties":{"config":{"applicablePages":[],"description":"DevCentral´s custom footer.","fetchedContent":null,"__typename":"ComponentConfiguration"},"props":[],"__typename":"ComponentProperties"},"form":null,"__typename":"Component","localOverride":false},"globalCss":null,"form":null},"localOverride":false},"CachedAsset:component:custom.widget.Tag_Manager_Helper-en-1740169766739":{"__typename":"CachedAsset","id":"component:custom.widget.Tag_Manager_Helper-en-1740169766739","value":{"component":{"id":"custom.widget.Tag_Manager_Helper","template":{"id":"Tag_Manager_Helper","markupLanguage":"HANDLEBARS","style":null,"texts":null,"defaults":{"config":{"applicablePages":[],"description":"Helper widget to inject Tag Manager scripts into head element","fetchedContent":null,"__typename":"ComponentConfiguration"},"props":[],"__typename":"ComponentProperties"},"components":[{"id":"custom.widget.Tag_Manager_Helper","form":null,"config":null,"props":[],"__typename":"Component"}],"grouping":"CUSTOM","__typename":"ComponentTemplate"},"properties":{"config":{"applicablePages":[],"description":"Helper widget to inject Tag Manager scripts into head element","fetchedContent":null,"__typename":"ComponentConfiguration"},"props":[],"__typename":"ComponentProperties"},"form":null,"__typename":"Component","localOverride":false},"globalCss":null,"form":null},"localOverride":false},"CachedAsset:component:custom.widget.Consent_Blackbar-en-1740169766739":{"__typename":"CachedAsset","id":"component:custom.widget.Consent_Blackbar-en-1740169766739","value":{"component":{"id":"custom.widget.Consent_Blackbar","template":{"id":"Consent_Blackbar","markupLanguage":"HTML","style":null,"texts":null,"defaults":{"config":{"applicablePages":[],"description":"","fetchedContent":null,"__typename":"ComponentConfiguration"},"props":[],"__typename":"ComponentProperties"},"components":[{"id":"custom.widget.Consent_Blackbar","form":null,"config":null,"props":[],"__typename":"Component"}],"grouping":"TEXTHTML","__typename":"ComponentTemplate"},"properties":{"config":{"applicablePages":[],"description":"","fetchedContent":null,"__typename":"ComponentConfiguration"},"props":[],"__typename":"ComponentProperties"},"form":null,"__typename":"Component","localOverride":false},"globalCss":null,"form":null},"localOverride":false},"CachedAsset:text:en_US-components/community/Breadcrumb-1740415743150":{"__typename":"CachedAsset","id":"text:en_US-components/community/Breadcrumb-1740415743150","value":{"navLabel":"Breadcrumbs","dropdown":"Additional parent page navigation"},"localOverride":false},"CachedAsset:text:en_US-components/tags/TagsHeaderWidget-1740415743150":{"__typename":"CachedAsset","id":"text:en_US-components/tags/TagsHeaderWidget-1740415743150","value":{"tag":"{tagName}","topicsCount":"{count} {count, plural, one {Topic} other {Topics}}"},"localOverride":false},"CachedAsset:text:en_US-components/messages/MessageListForNodeByRecentActivityWidget-1740415743150":{"__typename":"CachedAsset","id":"text:en_US-components/messages/MessageListForNodeByRecentActivityWidget-1740415743150","value":{"title@userScope:other":"Recent Content","title@userScope:self":"Contributions","title@board:FORUM@userScope:other":"Recent Discussions","title@board:BLOG@userScope:other":"Recent Blogs","emptyDescription":"No content to show","MessageListForNodeByRecentActivityWidgetEditor.nodeScope.label":"Scope","title@instance:1706288370055":"Content Feed","title@instance:1704319314827":"Blog Feed","title@instance:1704317906837":"Content Feed","title@instance:1702668293472":"Community Feed","title@instance:1704320290851":"My Contributions","title@instance:1703720491809":"Forum Feed","title@instance:1703028709746":"Group Content Feed","title@instance:VTsglH":"Content Feed"},"localOverride":false},"Category:category:Forums":{"__typename":"Category","id":"category:Forums","categoryPolicies":{"__typename":"CategoryPolicies","canReadNode":{"__typename":"PolicyResult","failureReason":null}},"displayId":"Forums"},"Forum:board:TechnicalForum":{"__typename":"Forum","id":"board:TechnicalForum","forumPolicies":{"__typename":"ForumPolicies","canReadNode":{"__typename":"PolicyResult","failureReason":null}},"boardPolicies":{"__typename":"BoardPolicies","canReadNode":{"__typename":"PolicyResult","failureReason":null}},"displayId":"TechnicalForum","nodeType":"board","conversationStyle":"FORUM","title":"Technical Forum","shortTitle":"Technical Forum","parent":{"__ref":"Category:category:Forums"}},"Forum:board:WaterCooler":{"__typename":"Forum","id":"board:WaterCooler","forumPolicies":{"__typename":"ForumPolicies","canReadNode":{"__typename":"PolicyResult","failureReason":null}},"boardPolicies":{"__typename":"BoardPolicies","canReadNode":{"__typename":"PolicyResult","failureReason":null}}},"Category:category:Articles":{"__typename":"Category","id":"category:Articles","categoryPolicies":{"__typename":"CategoryPolicies","canReadNode":{"__typename":"PolicyResult","failureReason":null}},"displayId":"Articles"},"Tkb:board:TechnicalArticles":{"__typename":"Tkb","id":"board:TechnicalArticles","tkbPolicies":{"__typename":"TkbPolicies","canReadNode":{"__typename":"PolicyResult","failureReason":null}},"boardPolicies":{"__typename":"BoardPolicies","canReadNode":{"__typename":"PolicyResult","failureReason":null}},"displayId":"TechnicalArticles","nodeType":"board","conversationStyle":"TKB","title":"Technical Articles","shortTitle":"Technical Articles","parent":{"__ref":"Category:category:Articles"}},"Tkb:board:DevCentralNews":{"__typename":"Tkb","id":"board:DevCentralNews","tkbPolicies":{"__typename":"TkbPolicies","canReadNode":{"__typename":"PolicyResult","failureReason":null}},"boardPolicies":{"__typename":"BoardPolicies","canReadNode":{"__typename":"PolicyResult","failureReason":null}}},"Category:category:GroupsCategory":{"__typename":"Category","id":"category:GroupsCategory","categoryPolicies":{"__typename":"CategoryPolicies","canReadNode":{"__typename":"PolicyResult","failureReason":null}}},"Category:category:F5-Groups":{"__typename":"Category","id":"category:F5-Groups","categoryPolicies":{"__typename":"CategoryPolicies","canReadNode":{"__typename":"PolicyResult","failureReason":null}}},"Category:category:CommunityGroups":{"__typename":"Category","id":"category:CommunityGroups","categoryPolicies":{"__typename":"CategoryPolicies","canReadNode":{"__typename":"PolicyResult","failureReason":null}}},"Occasion:board:Events":{"__typename":"Occasion","id":"board:Events","boardPolicies":{"__typename":"BoardPolicies","canReadNode":{"__typename":"PolicyResult","failureReason":null}},"occasionPolicies":{"__typename":"OccasionPolicies","canReadNode":{"__typename":"PolicyResult","failureReason":null}}},"Idea:board:Suggestions":{"__typename":"Idea","id":"board:Suggestions","boardPolicies":{"__typename":"BoardPolicies","canReadNode":{"__typename":"PolicyResult","failureReason":null}},"ideaPolicies":{"__typename":"IdeaPolicies","canReadNode":{"__typename":"PolicyResult","failureReason":null}}},"Category:category:CrowdSRC":{"__typename":"Category","id":"category:CrowdSRC","categoryPolicies":{"__typename":"CategoryPolicies","canReadNode":{"__typename":"PolicyResult","failureReason":null}}},"Tkb:board:codeshare":{"__typename":"Tkb","id":"board:codeshare","tkbPolicies":{"__typename":"TkbPolicies","canReadNode":{"__typename":"PolicyResult","failureReason":null}},"boardPolicies":{"__typename":"BoardPolicies","canReadNode":{"__typename":"PolicyResult","failureReason":null}}},"Tkb:board:communityarticles":{"__typename":"Tkb","id":"board:communityarticles","tkbPolicies":{"__typename":"TkbPolicies","canReadNode":{"__typename":"PolicyResult","failureReason":null}},"boardPolicies":{"__typename":"BoardPolicies","canReadNode":{"__typename":"PolicyResult","failureReason":null}}},"Tkb:board:security-insights":{"__typename":"Tkb","id":"board:security-insights","tkbPolicies":{"__typename":"TkbPolicies","canReadNode":{"__typename":"PolicyResult","failureReason":null}},"boardPolicies":{"__typename":"BoardPolicies","canReadNode":{"__typename":"PolicyResult","failureReason":null}},"displayId":"security-insights","nodeType":"board","conversationStyle":"TKB","title":"Security Insights","shortTitle":"Security Insights","parent":{"__ref":"Category:category:Articles"}},"Tkb:board:article-series":{"__typename":"Tkb","id":"board:article-series","tkbPolicies":{"__typename":"TkbPolicies","canReadNode":{"__typename":"PolicyResult","failureReason":null}},"boardPolicies":{"__typename":"BoardPolicies","canReadNode":{"__typename":"PolicyResult","failureReason":null}}},"Conversation:conversation:338873":{"__typename":"Conversation","id":"conversation:338873","topic":{"__typename":"TkbTopicMessage","uid":338873},"lastPostingActivityTime":"2025-02-26T13:27:59.450-08:00","solved":false},"User:user:56757":{"__typename":"User","uid":56757,"login":"Jordan_Zebor","registrationData":{"__typename":"RegistrationData","status":null},"deleted":false,"avatar":{"__typename":"UserAvatar","url":"https://community.f5.com/t5/s/zihoc95639/images/dS01Njc1Ny0yMjQwNGkxRjU4NUFCNzdBRjYzQTMz"},"id":"user:56757"},"TkbTopicMessage:message:338873":{"__typename":"TkbTopicMessage","subject":"A Closer Look at mTLS and the Default Server in F5 NGINX","conversation":{"__ref":"Conversation:conversation:338873"},"id":"message:338873","revisionNum":15,"uid":338873,"depth":0,"board":{"__ref":"Tkb:board:security-insights"},"author":{"__ref":"User:user:56757"},"teaser@stripHtml({\"removeProcessingText\":true,\"truncateLength\":-1})":"","introduction":"","metrics":{"__typename":"MessageMetrics","views":81},"postTime":"2025-02-11T13:00:50.932-08:00","lastPublishTime":"2025-02-26T13:27:59.450-08:00","body@stripHtml({\"removeProcessingText\":true,\"removeSpoilerMarkup\":true,\"removeTocMarkup\":true,\"truncateLength\":-1})":" When you connect to an HTTPS site, your browser (or other client) typically sends a Server Name Indication (SNI)—the hostname it wants to reach—during the TLS handshake. This lets F5 NGINX figure out which cryptographic settings to use for that specific hostname. In other words, SNI influences: \n \n Which x509 certificate is sent to the client \n Which cryptographic algorithms are offered \n Which session ticket key is used for encrypting and decrypting session tickets \n Which session cache is active, if you’re using caching \n Which Certificate Authority (CA) is checked when you require mutual TLS (mTLS) \n \n If the client doesn’t provide SNI or if the hostname doesn’t match any of your configured server_name directives, F5 NGINX defaults to a “fallback” setup—usually called the default server. That means: \n \n The default server’s certificate, ciphers, ticket key, and session cache get used automatically. \n If you haven’t explicitly marked any server block as default_server, F5 NGINX chooses the first block for that listen socket in your configuration as the fallback. \n \n Here’s the crucial detail: once the TLS handshake finishes and a certificate has been selected (for example, from the default server), F5 NGINX will still examine the HTTP Host header for request routing.\u0026nbsp;If it specifies a different domain matching another server block, the request is forwarded there at the HTTP layer. From the client’s perspective, however, the originally cryptographic settings remain in effect, because the TLS negotiation is already complete. \n \u0026nbsp; \n Single Server Block \n In the simplest configuration, only one server block listens for TLS connections on a given IP address and port: \n server {\n listen 443 ssl;\n server_name example.com;\n ssl_certificate /etc/ssl/certs/example.com.crt;\n ssl_certificate_key /etc/ssl/private/example.com.key;\n ssl_client_certificate /etc/ssl/certs/ca.crt;\n ssl_verify_client on;\n\n # Additional configuration, such as locations and logging\n}\n \n \u0026nbsp; \n In this example: \n \n If the client provides SNI matching example.com, F5 NGINX presents /etc/ssl/certs/example.com.crt and verifies the client certificate against /etc/ssl/certs/ca.crt. \n If the client does not provide SNI, this same server block still handles the request because there are no other blocks to consider; the same certificate and CA (ca.crt) apply. \n Once authenticated, the client proceeds under the cryptographic settings of this single server block. With only one server block present, there is no additional routing or fallback scenario to manage. \n \n \u0026nbsp; \n Multiple Server Blocks on the Same IP/Port \n When multiple server blocks listen on the same IP address and port, F5 NGINX uses SNI to determine which server block should handle the request. If no matching SNI is found, requests fall back to the server marked with default_server. As previously stated, if the default_server is not explicitly defined, F5 NGINX will use the first server block in the configuration as the fallback. \n # example.com and the default server (first in config)\nserver {\n listen 443 ssl;\n server_name example.com;\n ssl_certificate /etc/ssl/certs/example.com.crt;\n ssl_certificate_key /etc/ssl/private/example.com.key;\n ssl_client_certificate /etc/ssl/certs/ca_A.crt;\n ssl_verify_client on;\n # Additional configuration, such as locations and logging\n\n}\n\n# www.example.com\nserver {\n listen 443 ssl;\n server_name www.example.com;\n ssl_certificate /etc/ssl/certs/www.example.com.crt;\n ssl_certificate_key /etc/ssl/private/www.example.com.key;\n ssl_client_certificate /etc/ssl/certs/ca_B.crt;\n ssl_verify_client on;\n\n # Additional configuration, such as locations and logging\n}\n \n \u0026nbsp; \n In this example: \n \n If the client provides SNI matching example.com, the first server block’s certificate (example.com.crt) and CA settings (ca_A.crt) are used. \n If the client provides SNI matching www.example.com, the second server block’s certificate (www.example.com.crt) and CA settings (ca_B.crt) are used. \n If the client does not provide SNI (or provides an unmatched server name), the first server block (example.com) acts as the default. Its certificate (example.com.crt) and CA (ca_A.crt) apply for the TLS handshake. \n After TLS is established under the default server, if the HTTP Host header is www.example.com, F5 NGINX routes the request to the second server block for application-level processing. However, the TLS session—including which certificate and CA were used—remains with the default server’s settings. This means the second server’s client certificate configuration (ca_B.crt) is not involved in re-validating the client, since no new TLS handshake occurs. \n \n \u0026nbsp; \n Recommendations \n The fallback behavior mentioned above might not fit all use cases. If it poses a risk or doesn’t align with your security needs, consider reconfiguring F5 NGINX (e.g., setting up a stub default server or applying tighter mTLS rules) to restrict or eliminate this fallback path. \n Defining a Default Server (or Stub Default Server) It is highly recommended to define a default server in F5 NGINX. If you do not want to allow fallback for clients without valid SNI, you can set up a stub default server (configuration example below). \n A stub default server, as shown below, ensures that unmatched SNI (or no SNI) connections are rejected at the handshake level, preventing unintended fallback to a less restrictive configuration. Perhaps most importantly, it does not contain any client authentication configuration directives, forcing client authentication to occur in the most specific server blocks. In the example below I have added `ssl_verify_client off;` for illustrative purposes, however the setting of `off` is the default. Note: ssl_reject_handshake appeared in nginx version 1.19.4. For versions prior to that, one can define a server that simply returns the special 444 HTTP response code. \n Authorization Checks in All Server Blocks Even with a stub default server, all server blocks should implement authorization checks if they serve sensitive content. Because requests may be forwarded from the default server to a non-default server after decryption, every server block must enforce its own mTLS policies and check variables such as $ssl_client_s_dn or $ssl_client_i_dn (if you rely on client certificates) to ensure consistent and robust security across your deployment. \n # explicit default server\nserver {\n listen 443 ssl default_server;\n ssl_reject_handshake on;\n ssl_verify_client off;\n ssl_protocols TLSv1.2 TLSv1.3;\n}\n\n# example.com\nserver {\n listen 443 ssl;\n server_name example.com;\n ssl_certificate /etc/ssl/certs/example.com.crt;\n ssl_certificate_key /etc/ssl/private/example.com.key;\n ssl_client_certificate /etc/ssl/certs/ca_A.crt;\n ssl_verify_client on;\n\n # Check subject DN\n if ($ssl_client_s_dn !~ \"CN=TrustedClient_A,O=MyOrg\") {\n return 403;\n }\n # Check issuer DN (this may not be necessary for all deployments)\n if ($ssl_client_i_dn !~ \"CN=TrustedCA_A,O=MyOrg\") {\n return 403;\n }\n # Additional configuration, such as locations and logging\n}\n\n# This server block handles requests for www.example.com\nserver {\n listen 443 ssl;\n server_name www.example.com;\n ssl_certificate /etc/ssl/certs/www.example.com.crt;\n ssl_certificate_key /etc/ssl/private/www.example.com.key;\n ssl_client_certificate /etc/ssl/certs/ca_B.crt;\n ssl_verify_client on;\n \n # Check subject DN\n if ($ssl_client_s_dn !~ \"CN=TrustedClient_B,O=MyOrg\") {\n return 403;\n }\n # Check issuer DN (this may not be necessary for all deployments)\n if ($ssl_client_i_dn !~ \"CN=TrustedCA_B,O=MyOrg\") {\n return 403;\n }\n # Additional configuration, such as locations and logging\n}\n \n \n Conclusion \n In summary, working with multiple server blocks, SNI, and mTLS can make F5 NGINX setups more complex. Knowing precisely which server block handles the TLS handshake—particularly when there is no SNI or an unmatched name—helps maintain the desired security posture. Careful attention to these details keeps certificates and policies consistent for all client connections. \n \u0026nbsp; ","body@stripHtml({\"removeProcessingText\":true,\"removeSpoilerMarkup\":true,\"removeTocMarkup\":true,\"truncateLength\":-1})@stringLength":"8326","kudosSumWeight":2,"repliesCount":0,"readOnly":false,"images":{"__typename":"AssociatedImageConnection","edges":[],"totalCount":0,"pageInfo":{"__typename":"PageInfo","hasNextPage":false,"endCursor":null,"hasPreviousPage":false,"startCursor":null}},"videos":{"__typename":"VideoConnection","edges":[],"totalCount":0,"pageInfo":{"__typename":"PageInfo","hasNextPage":false,"endCursor":null,"hasPreviousPage":false,"startCursor":null}}},"Conversation:conversation:339995":{"__typename":"Conversation","id":"conversation:339995","topic":{"__typename":"TkbTopicMessage","uid":339995},"lastPostingActivityTime":"2025-02-26T11:26:21.781-08:00","solved":false},"User:user:217342":{"__typename":"User","uid":217342,"login":"Christopher_Pa1","registrationData":{"__typename":"RegistrationData","status":null},"deleted":false,"avatar":{"__typename":"UserAvatar","url":"https://community.f5.com/t5/s/zihoc95639/images/dS0yMTczNDItSUNpMG9j?image-coordinates=0%2C0%2C160%2C160"},"id":"user:217342"},"TkbTopicMessage:message:339995":{"__typename":"TkbTopicMessage","subject":"U.S. Government cuts, Majorana 1 Chip, CVEs for Mongoose and OpenSSH","conversation":{"__ref":"Conversation:conversation:339995"},"id":"message:339995","revisionNum":3,"uid":339995,"depth":0,"board":{"__ref":"Tkb:board:security-insights"},"author":{"__ref":"User:user:217342"},"teaser@stripHtml({\"removeProcessingText\":true,\"truncateLength\":-1})":"","introduction":"","metrics":{"__typename":"MessageMetrics","views":108},"postTime":"2025-02-26T11:26:21.781-08:00","lastPublishTime":"2025-02-26T11:26:21.781-08:00","body@stripHtml({\"removeProcessingText\":true,\"removeSpoilerMarkup\":true,\"removeTocMarkup\":true,\"truncateLength\":-1})":" Notable news for the week of February 17th\u0026nbsp;through February 24th.\u0026nbsp; Your editor this week is Chris from the F5 Security Incident Response Team. For this edition, we discuss U.S. government cuts to cyber security and consumer protections; Microsoft’s advancement in the field of quantum computing, and new flaws found in both MongoDB as well as OpenSSH.\u0026nbsp; \n \u0026nbsp; \n Cuts to Cyber and Consumer Protections\u0026nbsp; \n With the new administration in the US, there have been a large amount of job cuts throughout the federal government.\u0026nbsp; This also includes at least 130 employees being fired from the Cybersecurity and Infrastructure Security Agency (CISA). These cuts are reported to include staff dedicated to election security, fighting misinformation, and foreign influence operations. Along with the cuts, the Department of Government Efficiency (DOGE) arrived at CISA and were given access to the agency’s email and files. DOGE has been gaining access to many sensitive federal agencies that contain a large amount of personal and financial information on Americans.\u0026nbsp; These agencies include the Social Security Administration (SSA), the Department of Homeland Security, the Office of Personnel Management (OPM), and the Treasury Department. DOGE has also been trying to gain access to the systems of the Internal Revenue Service (IRS).\u0026nbsp; From a security standpoint, this is extremely alarming because it appears to be bypassing many security safeguards and measures. This sentiment is reported by many security experts.\u0026nbsp; Another aspect that does not inspire confidence is that the doge.gov website administrators had left their database wide open, allowing someone to publish messages making fun of the insecurity that the site has.\u0026nbsp; \n On the aspect of consumer protection, the Consumer Financial Protection Bureau (CFPB) was ordered to stop most work. The CFPB was created in 2011 to protect consumers from financial institutions that violate consumer protection laws. The newly appointed CFPB director, Russell Vought, has publicly favored abolishing the agency which is alarming since it would remove some of the regulations that exist.\u0026nbsp; \n https://krebsonsecurity.com/2025/02/trump-2-0-brings-cuts-to-cyber-consumer-protections/ \n \u0026nbsp; \n Microsoft's Majorana 1 Chip\u0026nbsp; \n Microsoft has announced the world's first quantum processor that uses topological qubits.\u0026nbsp; They have named this the Majorana 1.\u0026nbsp; They have designed this to scale to a million qubits on a single chip. Typical qubits are highly sensitive to noise in the environment. This can cause them to lose their quantum state introducing errors. This is known as decoherence.\u0026nbsp; To counter this there needs to be many more qubits added for error correction which means a lot more room needed for just one qubit to work. Topological qubits work by encoding information in the topology of the physical system which in theory, makes each qubit more fault tolerant. Essentially, this means few are needed in the long run to produce a quantum computer. This is a huge achievement but along with it comes the security concerns. The main concern being the ability to do quantum decryption.\u0026nbsp;This technology brings the reality of a fault tolerant protype to years instead of decades.\u0026nbsp; Many believe this will be within 5 to 10 years.\u0026nbsp;\u0026nbsp; \n https://www.securityweek.com/what-microsofts-majorana-1-chip-means-for-quantum-decryption/\u0026nbsp; \n \u0026nbsp; \n Critical MongoDB Library Flaws\u0026nbsp; \n Two critical vulnerabilities in a third-party library that MongoDB relies on was found which can lead to stolen data or code to be ran. Mongoose is an Object Data Modeling (ODM) library used by MongoDB to enable database integrations in Node.js applications. Researchers at OPSWAT revealed two critical security flaws that threaten the integrity of data stored in MongoDB as well as opening it up to theft, manipulation, or destruction.\u0026nbsp;\u0026nbsp; \n This first CVE is CVE-2024-53900 which is given a CVSS score of 9.1. This is an SQL injection bug which allows a specially crafted query to bypass MongoDB's server-side JavaScript restrictions potentially leading to a remote code execution (RCE). This was reported in November and patched in version 8.8.3.\u0026nbsp;\u0026nbsp; \n The second CVE is CVE-2025-23061 with a CVSS score of 9.0. This was found by the same researcher and is actually a bypass in the patched version that still allowed for RCE. This was addressed in version 8.9.5.\u0026nbsp; \n https://www.theregister.com/2025/02/20/mongoose_flaws_mongodb/\u0026nbsp; \n \u0026nbsp; \n New OpenSSH Flaws \u0026nbsp; \n Two new security vulnerabilities have been found in the OpenSSH suite which could result in an active Machine-in-the-Middle (MitM) or a Denial-of-Service (DoS) attack under specific conditions.\u0026nbsp;\u0026nbsp; \n The first is CVE-2025-26465 with a CVSS score of 6.8. The OpenSSH client contains a logic error between versions 6.8p1 to 9.9p1 (inclusive) that makes it vulnerable to a MitM attack if the\u0026nbsp;VerifyHostKeyDNS\u0026nbsp;option is enabled.\u0026nbsp; \n The second is CVE-2025-26466 with a CVSS score of 5.9. The OpenSSH client and server are vulnerable to a pre-authentication DoS attack between versions 9.5p1 to 9.9p1 (inclusive) that causes memory and CPU consumption.\u0026nbsp;\u0026nbsp; \n A successful exploitation of the first one could permit malicious actors to compromise and hijack SSH sessions and possibly gain access to sensitive data. The VerifyHostKeyDNS is disabled by default.\u0026nbsp;\u0026nbsp; \n Exploitation of the second CVE can result in availability issues as indicated by labeling as a DoS vulnerability.\u0026nbsp; \n Both of these CVEs have been addressed in version 9.9p2 of OpenSSH which was released on February 18th.\u0026nbsp;\u0026nbsp; \n https://thehackernews.com/2025/02/new-openssh-flaws-enable-man-in-middle.html\u0026nbsp;\u0026nbsp; ","body@stripHtml({\"removeProcessingText\":true,\"removeSpoilerMarkup\":true,\"removeTocMarkup\":true,\"truncateLength\":-1})@stringLength":"5841","kudosSumWeight":1,"repliesCount":0,"readOnly":false,"images":{"__typename":"AssociatedImageConnection","edges":[],"totalCount":0,"pageInfo":{"__typename":"PageInfo","hasNextPage":false,"endCursor":null,"hasPreviousPage":false,"startCursor":null}},"videos":{"__typename":"VideoConnection","edges":[],"totalCount":0,"pageInfo":{"__typename":"PageInfo","hasNextPage":false,"endCursor":null,"hasPreviousPage":false,"startCursor":null}}},"Conversation:conversation:293896":{"__typename":"Conversation","id":"conversation:293896","topic":{"__typename":"TkbTopicMessage","uid":293896},"lastPostingActivityTime":"2025-02-26T08:38:08.455-08:00","solved":false},"User:user:275378":{"__typename":"User","uid":275378,"login":"Ted_Byerly","registrationData":{"__typename":"RegistrationData","status":null},"deleted":false,"avatar":{"__typename":"UserAvatar","url":"https://community.f5.com/t5/s/zihoc95639/m_assets/avatars/default/avatar-10.svg?time=0"},"id":"user:275378"},"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0yOTM4OTYtMTcyNjlpNUQ3RjAwRjdFRjM3NUZBNg?revision=10\"}":{"__typename":"AssociatedImage","url":"https://community.f5.com/t5/s/zihoc95639/images/bS0yOTM4OTYtMTcyNjlpNUQ3RjAwRjdFRjM3NUZBNg?revision=10","title":"fd538374-7ffc-4ace-b1d7-6c1e84a4be83.jpeg","associationType":"COVER","width":1443,"height":961,"altText":""},"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0yOTM4OTYtMTcxMjJpMEJFODhDNjlDNDU0MjI1Mg?revision=10\"}":{"__typename":"AssociatedImage","url":"https://community.f5.com/t5/s/zihoc95639/images/bS0yOTM4OTYtMTcxMjJpMEJFODhDNjlDNDU0MjI1Mg?revision=10","title":"SecurityServiceInsertion.png","associationType":"BODY","width":960,"height":540,"altText":"SecurityServiceInsertion.png"},"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0yOTM4OTYtMTcwOTFpNDRBNkNEMjg0RDY4REE1NA?revision=10\"}":{"__typename":"AssociatedImage","url":"https://community.f5.com/t5/s/zihoc95639/images/bS0yOTM4OTYtMTcwOTFpNDRBNkNEMjg0RDY4REE1NA?revision=10","title":"Screen Shot 2022-03-24 at 2.13.58 PM.png","associationType":"BODY","width":1086,"height":984,"altText":"Screen Shot 2022-03-24 at 2.13.58 PM.png"},"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0yOTM4OTYtMTcwOTBpOEJGMjVGN0ZGMUM4RjMzRQ?revision=10\"}":{"__typename":"AssociatedImage","url":"https://community.f5.com/t5/s/zihoc95639/images/bS0yOTM4OTYtMTcwOTBpOEJGMjVGN0ZGMUM4RjMzRQ?revision=10","title":"Welcome_Screen.png","associationType":"BODY","width":1233,"height":1081,"altText":"Welcome_Screen.png"},"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0yOTM4OTYtMTcwOTJpMTU5MjRBQ0EzMzUyRjREMw?revision=10\"}":{"__typename":"AssociatedImage","url":"https://community.f5.com/t5/s/zihoc95639/images/bS0yOTM4OTYtMTcwOTJpMTU5MjRBQ0EzMzUyRjREMw?revision=10","title":"Screen Shot 2022-03-15 at 12.44.45 PM.png","associationType":"BODY","width":1635,"height":906,"altText":"Screen Shot 2022-03-15 at 12.44.45 PM.png"},"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0yOTM4OTYtMTcwOTVpRERDQUYxQjE1RjAxOTRDRg?revision=10\"}":{"__typename":"AssociatedImage","url":"https://community.f5.com/t5/s/zihoc95639/images/bS0yOTM4OTYtMTcwOTVpRERDQUYxQjE1RjAxOTRDRg?revision=10","title":"AWS_TWG_Site.png","associationType":"BODY","width":1134,"height":1276,"altText":"AWS_TWG_Site.png"},"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0yOTM4OTYtMTcwOTZpQkNGMUNGNkVGQTE5QUU4Nw?revision=10\"}":{"__typename":"AssociatedImage","url":"https://community.f5.com/t5/s/zihoc95639/images/bS0yOTM4OTYtMTcwOTZpQkNGMUNGNkVGQTE5QUU4Nw?revision=10","title":"AWS_Configuration.png","associationType":"BODY","width":938,"height":1265,"altText":"AWS_Configuration.png"},"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0yOTM4OTYtMTcwOTdpMDM5MzNEQUUzNThFQUQ2Mg?revision=10\"}":{"__typename":"AssociatedImage","url":"https://community.f5.com/t5/s/zihoc95639/images/bS0yOTM4OTYtMTcwOTdpMDM5MzNEQUUzNThFQUQ2Mg?revision=10","title":"Ingress_Egress.png","associationType":"BODY","width":1269,"height":909,"altText":"Ingress_Egress.png"},"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0yOTM4OTYtMTcwOTlpODZBODVFQUI4QzQwRjdCOQ?revision=10\"}":{"__typename":"AssociatedImage","url":"https://community.f5.com/t5/s/zihoc95639/images/bS0yOTM4OTYtMTcwOTlpODZBODVFQUI4QzQwRjdCOQ?revision=10","title":"Screen Shot 2022-03-25 at 2.06.40 PM.png","associationType":"BODY","width":920,"height":295,"altText":"Screen Shot 2022-03-25 at 2.06.40 PM.png"},"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0yOTM4OTYtMTcxMDBpQzYxMzkwNkY3MUQ0RUY4QQ?revision=10\"}":{"__typename":"AssociatedImage","url":"https://community.f5.com/t5/s/zihoc95639/images/bS0yOTM4OTYtMTcxMDBpQzYxMzkwNkY3MUQ0RUY4QQ?revision=10","title":"Screen Shot 2022-03-25 at 2.07.13 PM.png","associationType":"BODY","width":1135,"height":1288,"altText":"Screen Shot 2022-03-25 at 2.07.13 PM.png"},"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0yOTM4OTYtMTcxMDFpMDQ3NEU5QkUxMDRERDBCRQ?revision=10\"}":{"__typename":"AssociatedImage","url":"https://community.f5.com/t5/s/zihoc95639/images/bS0yOTM4OTYtMTcxMDFpMDQ3NEU5QkUxMDRERDBCRQ?revision=10","title":"Screen Shot 2022-03-25 at 2.14.09 PM.png","associationType":"BODY","width":1139,"height":375,"altText":"Screen Shot 2022-03-25 at 2.14.09 PM.png"},"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0yOTM4OTYtMTcxMDNpRTU3RUNDNTFCQUY2MkY4Ng?revision=10\"}":{"__typename":"AssociatedImage","url":"https://community.f5.com/t5/s/zihoc95639/images/bS0yOTM4OTYtMTcxMDNpRTU3RUNDNTFCQUY2MkY4Ng?revision=10","title":"Screen Shot 2022-03-25 at 2.20.27 PM.png","associationType":"BODY","width":2456,"height":643,"altText":"Screen Shot 2022-03-25 at 2.20.27 PM.png"},"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0yOTM4OTYtMTcxMDRpQjJGRTIzOEI0NTNEQkE2OQ?revision=10\"}":{"__typename":"AssociatedImage","url":"https://community.f5.com/t5/s/zihoc95639/images/bS0yOTM4OTYtMTcxMDRpQjJGRTIzOEI0NTNEQkE2OQ?revision=10","title":"External_Service.png","associationType":"BODY","width":1770,"height":1172,"altText":"External_Service.png"},"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0yOTM4OTYtMTcxMDVpOUJCRjVGRkJGOEYwQkYwQw?revision=10\"}":{"__typename":"AssociatedImage","url":"https://community.f5.com/t5/s/zihoc95639/images/bS0yOTM4OTYtMTcxMDVpOUJCRjVGRkJGOEYwQkYwQw?revision=10","title":"External_Service_2.png","associationType":"BODY","width":1138,"height":1192,"altText":"External_Service_2.png"},"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0yOTM4OTYtMTcxMDZpMTFDOTBCMDJBMTYyMEZDQQ?revision=10\"}":{"__typename":"AssociatedImage","url":"https://community.f5.com/t5/s/zihoc95639/images/bS0yOTM4OTYtMTcxMDZpMTFDOTBCMDJBMTYyMEZDQQ?revision=10","title":"External_Service_3.png","associationType":"BODY","width":936,"height":1187,"altText":"External_Service_3.png"},"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0yOTM4OTYtMTcxMDdpREFBNzI0OEIwNEZGNUQyNw?revision=10\"}":{"__typename":"AssociatedImage","url":"https://community.f5.com/t5/s/zihoc95639/images/bS0yOTM4OTYtMTcxMDdpREFBNzI0OEIwNEZGNUQyNw?revision=10","title":"Service_Nodes.png","associationType":"BODY","width":1267,"height":431,"altText":"Service_Nodes.png"},"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0yOTM4OTYtMTcxMDhpQkEzRTQwQ0I2Q0ZENDMwMA?revision=10\"}":{"__typename":"AssociatedImage","url":"https://community.f5.com/t5/s/zihoc95639/images/bS0yOTM4OTYtMTcxMDhpQkEzRTQwQ0I2Q0ZENDMwMA?revision=10","title":"External_Service_2.png","associationType":"BODY","width":1138,"height":1192,"altText":"External_Service_2.png"},"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0yOTM4OTYtMTcxMDlpQTBFQzI5MTg1OTgyOThCMw?revision=10\"}":{"__typename":"AssociatedImage","url":"https://community.f5.com/t5/s/zihoc95639/images/bS0yOTM4OTYtMTcxMDlpQTBFQzI5MTg1OTgyOThCMw?revision=10","title":"Screen Shot 2022-03-24 at 1.14.55 PM.png","associationType":"BODY","width":1571,"height":836,"altText":"Screen Shot 2022-03-24 at 1.14.55 PM.png"},"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0yOTM4OTYtMTcxMTBpM0IwMUU4MjRDQzVBRTkwOA?revision=10\"}":{"__typename":"AssociatedImage","url":"https://community.f5.com/t5/s/zihoc95639/images/bS0yOTM4OTYtMTcxMTBpM0IwMUU4MjRDQzVBRTkwOA?revision=10","title":"ServiceDetail.png","associationType":"BODY","width":1326,"height":770,"altText":"ServiceDetail.png"},"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0yOTM4OTYtMTcxMTFpOUU5NzlGODc4RkFCQjg1OQ?revision=10\"}":{"__typename":"AssociatedImage","url":"https://community.f5.com/t5/s/zihoc95639/images/bS0yOTM4OTYtMTcxMTFpOUU5NzlGODc4RkFCQjg1OQ?revision=10","title":"TWG_Stats.png","associationType":"BODY","width":1332,"height":1284,"altText":"TWG_Stats.png"},"TkbTopicMessage:message:293896":{"__typename":"TkbTopicMessage","subject":"F5 Distributed Cloud Security Service Insertion With BIG-IP Advanced WAF","conversation":{"__ref":"Conversation:conversation:293896"},"id":"message:293896","revisionNum":10,"uid":293896,"depth":0,"board":{"__ref":"Tkb:board:TechnicalArticles"},"author":{"__ref":"User:user:275378"},"teaser@stripHtml({\"removeProcessingText\":true,\"truncateLength\":-1})":"","introduction":"","metrics":{"__typename":"MessageMetrics","views":2095},"postTime":"2022-04-10T09:00:00.022-07:00","lastPublishTime":"2025-02-26T08:38:08.455-08:00","body@stripHtml({\"removeProcessingText\":true,\"removeSpoilerMarkup\":true,\"removeTocMarkup\":true,\"truncateLength\":-1})":" \n In this article we will show you how to quickly deploy and operate external services of your choice across multiple public clouds.\u0026nbsp; For this article I will select the BIG-IP Advanced WAF (PAYG), future articles will cover additional solutions. \n \n Co-Author: Anitha Mareedu, Sr. Security Engineer, F5 \n \n Introduction \n F5’s Distributed Cloud Securtiy Service Insertion solution allows enterprises to deploy and operate external services of their choice across multiple public clouds. \n Let's start by looking at a real-world customer example. The enterprise has standardized on an external firewall in their private data center.\u0026nbsp; Their network and security team are very familiar with using BIG-IP AWAF. They want to deploy the same security firewall solution that they use in the private datacenter in the public cloud. \n The requirements are: \n \n a simple operational model to deploy these services \n a unified security policy \n consistency across different clouds \n simple deployments \n unified logging \n \n Challenges \n Customers have identified several challenges in moving to the cloud.\u0026nbsp; Initallly, teams that are very familiar with supporting services in their private data center usually do not have the expertise in designing, deploying and supporting in public clouds.\u0026nbsp; If the same team then is tasked with deploying to multiple clouds the gap widens, terminology, archtitecture tools and constructs are all unique. \n Second, the operational models are different across different clouds. In AWS, you use either a VPC or a transit gateway (TGW), in Azure you use a VNET and Google has VPC’s. \n Solution Description \n Let's look at how F5’s Distributed Cloud Security Service insertion solution helps simplify and unify security solution deployments in multi-cloud and hybrid cloud environments: \n \n \n Infrastructure-as-code: Implementation and policy configuration can be automated and run as infrastructure-as-code across clouds and regions, allowing policies to be repeatable in any major public or private cloud. \n \n Easy setup and management: This simplified setup and management extends across AWS, Azure, and other clouds, as the F5 Distributed Cloud Platform supports AWS Transit Gateway, virtual network peering in Azure, and use of VPC attachments. \n Define once and replicate models: No extra handcrafting is needed for consistent, straightforward operations and deployment. \n Unified traffic steering rules: With the Distributed Cloud Platform, traffic is rerouted from networks through the security service using the same steering rules across different public and private clouds. Using F5 Distributed Cloud Console, IT pros get granular visibility and single-pane-of-glass management of traffic across clouds and networks. \n Optional policy deployment routes: Policies can be deployed at either or both the network layer (using IP addresses) or the application layer (using APIs). \n \n Diagram \n \u0026nbsp; \n Step by Step Process \n This walk thru assumes you already have an AWS VPC deployed.\u0026nbsp; Have handy the VPC id. \n \n Log into the F5 Distributed Cloud Dashboard \n \n You are presented with the Dashboard where you can choose which deployment option you want to work with. We will be working with Cloud and Edge Sites. \n \n Select Cloud and Edge Sites \u0026gt; Manage \u0026gt; Site Management \u0026gt; AWS TWG Sites \n Click Add the AWS Transit Gateway (TWG) \n \n \n Under Metadata give your TWG site a Name, Label and Description \n Click on Configure under AWS Configuration \n \n This brings up the Services VPC Configuration Page \n \n Select your AWS region \n Select Services VPC, leave as New, let it genetrate a name or choose your own name and give the Primary CIDR block you want to assign to the VPC. \n Leave Transit Gateway as New TWG \n Leave BGP as Automatic \n Under Site Node Parameters, Ingress/ Egress select “Add Item” \n \n \n Move slider on upper right corner to Show Advanced Fields \n \n \n Fill in required configuration, AWS AZ Name and CIDR Blocks for each of the the subnets and click the “Add Item”\u0026nbsp; You can let the system autogenerate these or assign the desired range. \n \n This will take you back to the last screen, where you need to either create or select your cloud credentials. These are Programmatic Access Credentials allowing API access. \n \n Click Apply \n \n This takes you to the previous screen where we connect your current VPC to the Service VPC we are creating. (have VPC id available) \n Click Configure under VPC attachments \n \n \u0026nbsp;Click Add Item \n Supply VPC id \n Click Apply \n \n \u0026nbsp;This takes you back once again to the AWS TWG Site Screen. \n \n Finish with clicking Save and Exit. \n \n \n In the UI you will then click Apply. \n \n You are now deploying your new Security VPC via Terraform. \n While that is deploying we will move on to the External Services. \n \n Manage \u0026gt; Site Management \u0026gt; External Services \u0026gt; Add External Service \n \n \n Give your Service a name, add a label and description. \n Click “Configure” under Select NFV Service Provider. \n \n For this article we will select the F5 BIG-IP Advanced WAF (PAYG), future articles will cover additional solutions. \n \n Provide the Admin Password \n Admin Username \n public SSH Key that you will use to access your BIG-IP deployment. \n Select the TWG site you created above. \n Finally click “Add Item“ under Service Nodes. \n \n Service nodes \n \n Enter a Node name and the Avilibilty Zones you wish to delpoy into. Then click “Add Item”\u0026nbsp; \n \n \u0026nbsp;This will take you back to the original screen. \n \n Enable HTTPS Management of Nodes, supply a delegated doman that will issue a Certificate. \n Under Select Service Type” Keep Inside VIP at Automatic and Set the Outside VIP to “Advertise On Outside Network”. \n Finally Click “Save and Exit” \n \n \u0026nbsp;At the end, the External Security Service is deployed, and you are taken to all the External Services. \n \n Click the name of the External Service you deployed to expand the details \n \n \u0026nbsp; \n From this screen you are able to access several items, the two I want to point out are the TGW stats and the BIG-IP you deployed by clicking the Management Dashboard URL. \n \n Click under Site the TWG Service you deployed \n \n Here you are able to see fine grained stats under all the tabs. \n \n System Metrics \n Application Metrics \n Site Status \n Nodes \n Interfaces \n Alerts \n Requests \n Top Talkers \n Connections \n TWG \n Flow tables \n DHCP \n Status Objects \n Tools \n \n \u0026nbsp; \n Going back click the hyperlink to the BIG-IP if you wish to look at the configuration. \n F5 Distributed Cloud Service Insertion automatically configured your BIG-IP with the following information: \n • Interfaces • Self IPs • Routes • Management and credentials • VLANs • IPoIP tunnel SI\u0026lt;-\u0026gt; BIG-IP • VIP \n The following two items will need to be configured on your BIG-IP. This configuration \n \n Configure AWAF policies \n SecOps can access familiar BIG-IP UI using management link provided in F5 Cloud Console and set up and configure AWAF ploicies \n Define a Traffic Steering Policy\n \n Network traffic to define traffic steering policy at Network (L3/L4) layer \n Service policy to define traffic steering policy at App(L7) level. \n Below are the traffic steering control methods available:\n \n Network level – Ip address, port, etc \n App level – API, Method, etc \n \n \n \n \n \n At the end of this step, you can see traffic getting diverted to BIG-IP and getting inspected by BIG-IP. \n Summary \n As you can see, F5 Distributed Cloud Security Service Insertion dramatically reduces the operation complexity for deploying external services in public clouds, it greatly enhances the security posture and it vastly improves productivity for all the operations teams such as NetOps, SecOps or DevOps. \n ","body@stripHtml({\"removeProcessingText\":true,\"removeSpoilerMarkup\":true,\"removeTocMarkup\":true,\"truncateLength\":-1})@stringLength":"7837","kudosSumWeight":3,"repliesCount":0,"readOnly":false,"images":{"__typename":"AssociatedImageConnection","edges":[{"__typename":"AssociatedImageEdge","cursor":"MjUuMXwyLjF8b3wyNXxfTlZffDE","node":{"__ref":"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0yOTM4OTYtMTcyNjlpNUQ3RjAwRjdFRjM3NUZBNg?revision=10\"}"}},{"__typename":"AssociatedImageEdge","cursor":"MjUuMXwyLjF8b3wyNXxfTlZffDI","node":{"__ref":"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0yOTM4OTYtMTcxMjJpMEJFODhDNjlDNDU0MjI1Mg?revision=10\"}"}},{"__typename":"AssociatedImageEdge","cursor":"MjUuMXwyLjF8b3wyNXxfTlZffDM","node":{"__ref":"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0yOTM4OTYtMTcwOTFpNDRBNkNEMjg0RDY4REE1NA?revision=10\"}"}},{"__typename":"AssociatedImageEdge","cursor":"MjUuMXwyLjF8b3wyNXxfTlZffDQ","node":{"__ref":"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0yOTM4OTYtMTcwOTBpOEJGMjVGN0ZGMUM4RjMzRQ?revision=10\"}"}},{"__typename":"AssociatedImageEdge","cursor":"MjUuMXwyLjF8b3wyNXxfTlZffDU","node":{"__ref":"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0yOTM4OTYtMTcwOTJpMTU5MjRBQ0EzMzUyRjREMw?revision=10\"}"}},{"__typename":"AssociatedImageEdge","cursor":"MjUuMXwyLjF8b3wyNXxfTlZffDY","node":{"__ref":"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0yOTM4OTYtMTcwOTVpRERDQUYxQjE1RjAxOTRDRg?revision=10\"}"}},{"__typename":"AssociatedImageEdge","cursor":"MjUuMXwyLjF8b3wyNXxfTlZffDc","node":{"__ref":"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0yOTM4OTYtMTcwOTZpQkNGMUNGNkVGQTE5QUU4Nw?revision=10\"}"}},{"__typename":"AssociatedImageEdge","cursor":"MjUuMXwyLjF8b3wyNXxfTlZffDg","node":{"__ref":"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0yOTM4OTYtMTcwOTdpMDM5MzNEQUUzNThFQUQ2Mg?revision=10\"}"}},{"__typename":"AssociatedImageEdge","cursor":"MjUuMXwyLjF8b3wyNXxfTlZffDk","node":{"__ref":"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0yOTM4OTYtMTcwOTlpODZBODVFQUI4QzQwRjdCOQ?revision=10\"}"}},{"__typename":"AssociatedImageEdge","cursor":"MjUuMXwyLjF8b3wyNXxfTlZffDEw","node":{"__ref":"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0yOTM4OTYtMTcxMDBpQzYxMzkwNkY3MUQ0RUY4QQ?revision=10\"}"}},{"__typename":"AssociatedImageEdge","cursor":"MjUuMXwyLjF8b3wyNXxfTlZffDEx","node":{"__ref":"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0yOTM4OTYtMTcxMDFpMDQ3NEU5QkUxMDRERDBCRQ?revision=10\"}"}},{"__typename":"AssociatedImageEdge","cursor":"MjUuMXwyLjF8b3wyNXxfTlZffDEy","node":{"__ref":"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0yOTM4OTYtMTcxMDNpRTU3RUNDNTFCQUY2MkY4Ng?revision=10\"}"}},{"__typename":"AssociatedImageEdge","cursor":"MjUuMXwyLjF8b3wyNXxfTlZffDEz","node":{"__ref":"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0yOTM4OTYtMTcxMDRpQjJGRTIzOEI0NTNEQkE2OQ?revision=10\"}"}},{"__typename":"AssociatedImageEdge","cursor":"MjUuMXwyLjF8b3wyNXxfTlZffDE0","node":{"__ref":"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0yOTM4OTYtMTcxMDVpOUJCRjVGRkJGOEYwQkYwQw?revision=10\"}"}},{"__typename":"AssociatedImageEdge","cursor":"MjUuMXwyLjF8b3wyNXxfTlZffDE1","node":{"__ref":"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0yOTM4OTYtMTcxMDZpMTFDOTBCMDJBMTYyMEZDQQ?revision=10\"}"}},{"__typename":"AssociatedImageEdge","cursor":"MjUuMXwyLjF8b3wyNXxfTlZffDE2","node":{"__ref":"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0yOTM4OTYtMTcxMDdpREFBNzI0OEIwNEZGNUQyNw?revision=10\"}"}},{"__typename":"AssociatedImageEdge","cursor":"MjUuMXwyLjF8b3wyNXxfTlZffDE3","node":{"__ref":"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0yOTM4OTYtMTcxMDhpQkEzRTQwQ0I2Q0ZENDMwMA?revision=10\"}"}},{"__typename":"AssociatedImageEdge","cursor":"MjUuMXwyLjF8b3wyNXxfTlZffDE4","node":{"__ref":"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0yOTM4OTYtMTcxMDlpQTBFQzI5MTg1OTgyOThCMw?revision=10\"}"}},{"__typename":"AssociatedImageEdge","cursor":"MjUuMXwyLjF8b3wyNXxfTlZffDE5","node":{"__ref":"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0yOTM4OTYtMTcxMTBpM0IwMUU4MjRDQzVBRTkwOA?revision=10\"}"}},{"__typename":"AssociatedImageEdge","cursor":"MjUuMXwyLjF8b3wyNXxfTlZffDIw","node":{"__ref":"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0yOTM4OTYtMTcxMTFpOUU5NzlGODc4RkFCQjg1OQ?revision=10\"}"}}],"totalCount":20,"pageInfo":{"__typename":"PageInfo","hasNextPage":false,"endCursor":null,"hasPreviousPage":false,"startCursor":null}},"videos":{"__typename":"VideoConnection","edges":[],"totalCount":0,"pageInfo":{"__typename":"PageInfo","hasNextPage":false,"endCursor":null,"hasPreviousPage":false,"startCursor":null}}},"Conversation:conversation:283971":{"__typename":"Conversation","id":"conversation:283971","topic":{"__typename":"TkbTopicMessage","uid":283971},"lastPostingActivityTime":"2025-02-25T14:07:05.595-08:00","solved":false},"User:user:214133":{"__typename":"User","uid":214133,"login":"Hardeep_Kaur","registrationData":{"__typename":"RegistrationData","status":null},"deleted":false,"avatar":{"__typename":"UserAvatar","url":"https://community.f5.com/t5/s/zihoc95639/m_assets/avatars/custom/Frankenstack_02-1706129554890.svg?time=1706129593000"},"id":"user:214133"},"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0yODM5NzEtMTE2MDdpMzQzRkI0NEVGQTdBMTBBNg?revision=8\"}":{"__typename":"AssociatedImage","url":"https://community.f5.com/t5/s/zihoc95639/images/bS0yODM5NzEtMTE2MDdpMzQzRkI0NEVGQTdBMTBBNg?revision=8","title":"0151T0000040JicQAE.png","associationType":"BODY","width":1996,"height":579,"altText":"0151T0000040JicQAE.png"},"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0yODM5NzEtMTQzOTNpRDlFNEY2NEMxNzUwMkYyMA?revision=8\"}":{"__typename":"AssociatedImage","url":"https://community.f5.com/t5/s/zihoc95639/images/bS0yODM5NzEtMTQzOTNpRDlFNEY2NEMxNzUwMkYyMA?revision=8","title":"0151T0000040Qc7QAE.png","associationType":"BODY","width":1280,"height":610,"altText":"0151T0000040Qc7QAE.png"},"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0yODM5NzEtMTI1M2k0QjREQjE0MDNGNzM0QjhB?revision=8\"}":{"__typename":"AssociatedImage","url":"https://community.f5.com/t5/s/zihoc95639/images/bS0yODM5NzEtMTI1M2k0QjREQjE0MDNGNzM0QjhB?revision=8","title":"0151T0000040JidQAE.png","associationType":"BODY","width":1798,"height":915,"altText":"0151T0000040JidQAE.png"},"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0yODM5NzEtNDYzMWk5MUM4QkE3MEQ4NDE3RkQz?revision=8\"}":{"__typename":"AssociatedImage","url":"https://community.f5.com/t5/s/zihoc95639/images/bS0yODM5NzEtNDYzMWk5MUM4QkE3MEQ4NDE3RkQz?revision=8","title":"0151T0000040JihQAE.png","associationType":"BODY","width":1881,"height":1747,"altText":"0151T0000040JihQAE.png"},"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0yODM5NzEtMTg2MGkxQUZDQzY2MjJFMUY2QzVG?revision=8\"}":{"__typename":"AssociatedImage","url":"https://community.f5.com/t5/s/zihoc95639/images/bS0yODM5NzEtMTg2MGkxQUZDQzY2MjJFMUY2QzVG?revision=8","title":"0151T0000040JimQAE.png","associationType":"BODY","width":1820,"height":1258,"altText":"0151T0000040JimQAE.png"},"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0yODM5NzEtODc1MGk5MTFFRkE4QkE2RDY5MDc5?revision=8\"}":{"__typename":"AssociatedImage","url":"https://community.f5.com/t5/s/zihoc95639/images/bS0yODM5NzEtODc1MGk5MTFFRkE4QkE2RDY5MDc5?revision=8","title":"0151T0000040JinQAE.png","associationType":"BODY","width":1895,"height":1495,"altText":"0151T0000040JinQAE.png"},"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0yODM5NzEtMTA4NjNpNTYyM0FBN0Q5MDgyQzhCRQ?revision=8\"}":{"__typename":"AssociatedImage","url":"https://community.f5.com/t5/s/zihoc95639/images/bS0yODM5NzEtMTA4NjNpNTYyM0FBN0Q5MDgyQzhCRQ?revision=8","title":"0151T0000040JirQAE.png","associationType":"BODY","width":1558,"height":1408,"altText":"0151T0000040JirQAE.png"},"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0yODM5NzEtNDIzMWk1NThDNzNERUVDNDM2QUYy?revision=8\"}":{"__typename":"AssociatedImage","url":"https://community.f5.com/t5/s/zihoc95639/images/bS0yODM5NzEtNDIzMWk1NThDNzNERUVDNDM2QUYy?revision=8","title":"0151T0000040JiiQAE.png","associationType":"BODY","width":2092,"height":1413,"altText":"0151T0000040JiiQAE.png"},"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0yODM5NzEtTnpNQ2xh?revision=8\"}":{"__typename":"AssociatedImage","url":"https://community.f5.com/t5/s/zihoc95639/images/bS0yODM5NzEtTnpNQ2xh?revision=8","title":"irule.png","associationType":"BODY","width":1449,"height":1027,"altText":""},"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0yODM5NzEtNTYxNGlFQTIzRjk4OTQ3MDM5OThC?revision=8\"}":{"__typename":"AssociatedImage","url":"https://community.f5.com/t5/s/zihoc95639/images/bS0yODM5NzEtNTYxNGlFQTIzRjk4OTQ3MDM5OThC?revision=8","title":"0151T0000040JisQAE.png","associationType":"BODY","width":1276,"height":656,"altText":"0151T0000040JisQAE.png"},"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0yODM5NzEtNzI1OGk2QTM3NzVDNjM1QkVBQUZD?revision=8\"}":{"__typename":"AssociatedImage","url":"https://community.f5.com/t5/s/zihoc95639/images/bS0yODM5NzEtNzI1OGk2QTM3NzVDNjM1QkVBQUZD?revision=8","title":"0151T0000040JitQAE.png","associationType":"BODY","width":1555,"height":386,"altText":"0151T0000040JitQAE.png"},"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0yODM5NzEtMjAyaTI3MkExOEM2MjAwMjI3NUM?revision=8\"}":{"__typename":"AssociatedImage","url":"https://community.f5.com/t5/s/zihoc95639/images/bS0yODM5NzEtMjAyaTI3MkExOEM2MjAwMjI3NUM?revision=8","title":"0151T0000040JioQAE.png","associationType":"BODY","width":1435,"height":597,"altText":"0151T0000040JioQAE.png"},"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0yODM5NzEtMzYzOGk1QTA0REIyQ0M5NjIzQjBC?revision=8\"}":{"__typename":"AssociatedImage","url":"https://community.f5.com/t5/s/zihoc95639/images/bS0yODM5NzEtMzYzOGk1QTA0REIyQ0M5NjIzQjBC?revision=8","title":"0151T0000040N2LQAU.png","associationType":"BODY","width":2222,"height":1018,"altText":"0151T0000040N2LQAU.png"},"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0yODM5NzEtODYzM2lGNzREQzI1Q0Q5M0VBMEI2?revision=8\"}":{"__typename":"AssociatedImage","url":"https://community.f5.com/t5/s/zihoc95639/images/bS0yODM5NzEtODYzM2lGNzREQzI1Q0Q5M0VBMEI2?revision=8","title":"0151T0000040MvyQAE.png","associationType":"BODY","width":2099,"height":419,"altText":"0151T0000040MvyQAE.png"},"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0yODM5NzEtNjY2N2k1RTYxRDE4QjE3OTZCNkE1?revision=8\"}":{"__typename":"AssociatedImage","url":"https://community.f5.com/t5/s/zihoc95639/images/bS0yODM5NzEtNjY2N2k1RTYxRDE4QjE3OTZCNkE1?revision=8","title":"0151T0000040MwDQAU.png","associationType":"BODY","width":1236,"height":331,"altText":"0151T0000040MwDQAU.png"},"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0yODM5NzEtNDYzNGlDRDdBN0JFQzVEOEMwODBB?revision=8\"}":{"__typename":"AssociatedImage","url":"https://community.f5.com/t5/s/zihoc95639/images/bS0yODM5NzEtNDYzNGlDRDdBN0JFQzVEOEMwODBB?revision=8","title":"0151T0000040Jj1QAE.png","associationType":"BODY","width":718,"height":450,"altText":"0151T0000040Jj1QAE.png"},"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0yODM5NzEtNDE1aTRDODQ3ODk3QjU5REQ2Njc?revision=8\"}":{"__typename":"AssociatedImage","url":"https://community.f5.com/t5/s/zihoc95639/images/bS0yODM5NzEtNDE1aTRDODQ3ODk3QjU5REQ2Njc?revision=8","title":"0151T0000040MwNQAU.png","associationType":"BODY","width":2797,"height":1392,"altText":"0151T0000040MwNQAU.png"},"TkbTopicMessage:message:283971":{"__typename":"TkbTopicMessage","subject":"APM Configuration to Support Duo MFA using iRule","conversation":{"__ref":"Conversation:conversation:283971"},"id":"message:283971","revisionNum":8,"uid":283971,"depth":0,"board":{"__ref":"Tkb:board:TechnicalArticles"},"author":{"__ref":"User:user:214133"},"teaser@stripHtml({\"removeProcessingText\":true,\"truncateLength\":-1})":"","introduction":"","metrics":{"__typename":"MessageMetrics","views":17647},"postTime":"2021-03-03T08:35:12.000-08:00","lastPublishTime":"2024-12-10T05:00:00.030-08:00","body@stripHtml({\"removeProcessingText\":true,\"removeSpoilerMarkup\":true,\"removeTocMarkup\":true,\"truncateLength\":-1})":" Overview \n BIG-IP APM has supported Duo as an MFA provider for a long time with RADIUS-based integration. Recently, Duo has added support for Universal Prompt that uses Open ID Connect (OIDC) protocol to provide two-factor authentication. To integrate APM as an OIDC client and resource server, and Duo as an Identity Provider (IdP), Duo requires the user’s logon name and custom parameters to be sent for Authentication and Token request.\u0026nbsp; \n This guide describes the configuration required on APM to enable Duo MFA integration using an iRule. iRules addresses the custom parameter challenges by generating the needed custom values and saving them in session variables, which the OAuth Client agent then uses to perform MFA with Duo. This integration procedure is supported on BIG-IP versions 13.1, 14.1x, 15.1x, and 16.x. \n To integrate Duo MFA with APM, complete the following tasks:\u0026nbsp; \n 1. Choose deployment type: Per-request or Per-session \n 2. Configure credentials and policies for MFA on the DUO web portal \n 3. Create OAuth objects on the BIG-IP system \n 4. Configure the iRule \n 5. Create the appropriate access policy/policies on the BIG-IP system \n 6. Apply policy/policies and iRule to the APM virtual server \n Choose deployment type \n APM supports two different types of policies for performing authentication functions. \n \n Per-session policies: Per-session policies provide authentication and authorization functions that occur only at the beginning of a user’s session. These policies are compatible with most APM use cases such as VPN, Webtop portal, Remote Desktop, federation IdP, etc. \n Per-request policies: Per-request policies provide dynamic authentication and authorization functionality that may occur at any time during a user’s session, such as step-up authentication or auditing functions only for certain resources. These policies are only compatible with Identity Aware Proxy and Web Access Management use cases and cannot be used with VPN or webtop portals. \n \n This guide contains information about setting up both policy types. \n Prerequisites \n Ensure the BIG-IP system has DNS and internet connectivity to contact Duo directly for validating the user's OAuth tokens. \n Configure credentials and policies for MFA on Duo web portal \n Before you can protect your F5 BIG-IP APM Web application with Duo, you will first need to sign up for a Duo account.\u0026nbsp; \n 1. Log in to the Duo Admin Panel and navigate to Applications. \n 2. Click Protect an application.\u0026nbsp; \n Figure 1: Duo Admin Panel – Protect an Application \n 3. Locate the entry for F5 BIG-IP APM Web in the applications list and click Protect to get the Client ID, Client secret, and API hostname. You will need this information to configure objects on APM. \n Figure 2: Duo Admin Panel – F5 BIG-IP APM Web \n 4. As DUO is used as a secondary authentication factor, the user’s logon name is sent along with the authentication request. Depending on your security policy, you may want to pre-provision users in Duo, or you may allow them to self-provision to set their preferred authentication type when they first log on.\u0026nbsp; \n To add users to the Duo system, navigate to the Dashboard page and click the Add New...\u0026nbsp;-\u0026gt; Add User button. A Duo username should match the user's primary authentication username. Refer to the https://duo.com/docs/enrolling-users link for the different methods of user enrollment.\u0026nbsp; \n Refer to Duo Universal Prompt for additional information on Duo’s two-factor authentication.\u0026nbsp; \n Create OAuth objects on the BIG-IP system \n Create a JSON web key \n When APM is configured to act as an OAuth client or resource server, it uses JSON web keys (JWKs) to validate the JSON web tokens it receives from Duo. \n To create a JSON web key: \n 1. On the Main tab, select Access \u0026gt; Federation \u0026gt; JSON Web Token \u0026gt; Key Configuration. \n The Key Configuration screen opens. \n 2. To add a new key configuration, click Create. \n 3. In the ID and Shared Secret fields, enter the Client ID and Client Secret values respectively obtained from Duo when protecting the application.\u0026nbsp; \n 4. In the Type list, select the cryptographic algorithm used to sign the JSON web key. \n Figure 3: Key Configuration screen \n 5. Click Save.\u0026nbsp; \n Create a JSON web token \n As an OAuth client or resource server, APM validates the JSON web tokens (JWT) it receives from Duo.\u0026nbsp; \n To create a JSON web token: \n 1. On the Main tab, select Access \u0026gt; Federation \u0026gt; JSON Web Token \u0026gt; Token Configuration. \n The Token Configuration screen opens. \n 2. To add a new token configuration, click Create. \n 3. In the Issuer field, enter the API hostname value obtained from Duo when protecting the application.\u0026nbsp; \n 4. In the Signing Algorithms area, select from the Available list and populate the Allowed and Blocked lists. \n 5. In the Keys (JWK) area, select the previously configured JSON web key in the allowed list of keys. \n \u0026nbsp;Figure 4: Token Configuration screen \n 6. Click Save. \n Configure Duo as an OAuth provider \n APM uses the OAuth provider settings to get URIs on the external OAuth authorization server for JWT web tokens. \n To configure an OAuth provider: \n 1. On the Main tab, select Access \u0026gt; Federation \u0026gt; OAuth Client / Resource Server \u0026gt; Provider. \n The Provider screen opens. \n 2. To add a provider, click Create. \n 3. In the Name field, type a name for the provider. \n 4. From the Type list, select Custom. \n 5. For Token Configuration (JWT), select a configuration from the list.\u0026nbsp; \n 6. In the Authentication URI field, type the URI on the provider where APM should redirect the user for authentication. The hostname is the same as the API hostname in the Duo application. \n 7. In the Token URI field, type the URI on the provider where APM can get a token. The hostname is the same as the API hostname in the Duo application. \n Figure 5: OAuth Provider screen \n 8. Click Finished. \n Configure Duo server for APM \n The OAuth Server settings specify the OAuth provider and role that Access Policy Manager (APM) plays with that provider. It also sets the Client ID, Client Secret, and Client’s SSL certificates that APM uses to communicate with the provider. \n To configure a Duo server: \n 1. On the Main tab, select Access \u0026gt; Federation \u0026gt; OAuth Client / Resource Server \u0026gt; OAuth Server. \n The OAuth Server screen opens. \n 2. To add a server, click Create. \n 3. In the Name field, type a name for the Duo server. \n 4. From the Mode list, select how you want the APM to be configured. \n 5. From the Type list, select Custom. \n 6. From the OAuth Provider list, select the Duo provider. \n 7. From the DNS Resolver list, select a DNS resolver (or click the plus (+) icon, create a DNS resolver, and then select it). \n 8. In the Token Validation Interval field, type a number. \n In a per-request policy subroutine configured to validate the token, the subroutine repeats at this interval or the expiry time of the access token, whichever is shorter. \n 9. In the Client Settings area, paste the Client ID and Client secret you obtained from Duo when protecting the application. \n 10. From the Client's ServerSSL Profile Name, select a server SSL profile. \n Figure 6: OAuth Server screen \n 11. Click Finished. \n Configure an auth-redirect-request and a token-request \n Requests specify the HTTP method, parameters, and headers to use for the specific type of request. An auth-redirect-request tells Duo where to redirect the end-user, and a token-request accesses the authorization server for obtaining an access token. \n To configure an auth-redirect-request: \n 1. On the Main tab, select Access \u0026gt; Federation \u0026gt; OAuth Client / Resource Server \u0026gt; Request. \n The Request screen opens. \n 2. To add a request, click Create. \n 3. In the Name field, type a name for the request. \n 4. For the HTTP Method, select GET. \n 5. For the Type, select auth-redirect-request. \n 6. As shown in Figure 7, specify the list of GET parameters to be sent: \n \n request parameter with value depending on the type of policy \n For per-request policy: %{subsession.custom.jwt_duo}\u0026nbsp; \n For per-session policy: %{session.custom.jwt_duo} \n client_id parameter with type client-id \n response_type parameter with type response-type \n \n Figure 7: Request screen with auth-redirect-request (Use “subsession.custom…” for Per-request or “session.custom…” for Per-session) \n 7. Click Finished. \n To configure a token-request: \n 1. On the Main tab, select Access \u0026gt; Federation \u0026gt; OAuth Client / Resource Server \u0026gt; Request. \n The Request screen opens. \n 2. To add a request, click Create. \n 3. In the Name field, type a name for the request. \n 4. For the HTTP Method, select POST. \n 5. For the Type, select token-request. \n 6. As shown in Figure 8, specify the list of POST parameters to be sent: \n \n client_assertion parameter with value depending on the type of policy \n For per-request policy: %{subsession.custom.jwt_duo_token}\u0026nbsp; \n For per-session policy: %{session.custom.jwt_duo_token} \n client_assertion_type parameter with value urn:ietf:params:oauth:client-assertion-type:jwt-bearer \n grant_type parameter with type grant-type \n redirect_uri parameter with type redirect-uri\u0026nbsp; \n \n Figure 8: Request screen with token-request (Use “subsession.custom…” for Per-request or “session.custom…” for Per-session) \n 7. Click Finished. \n Configure the iRule \n iRules gives you the ability to customize and manage your network traffic. Configure an iRule that creates the required sub-session variables and usernames for Duo integration.\u0026nbsp; \n Note: This iRule has sections for both per-request and per-session policies and can be used for either type of deployment. \n To configure an iRule: \n 1. On the Main tab, click Local Traffic \u0026gt; iRules. \n 2. To create an iRules, click Create. \n 3. In the Name field, type a name for the iRule. \n 4. Copy the sample code given below and paste it in the Definition field.\u0026nbsp; \n Replace the following variables with values specific to the Duo application: \n \n \u0026lt;Duo Client ID\u0026gt; in the getClientId function with Duo Application ID.\u0026nbsp; \n \u0026lt;Duo API Hostname\u0026gt; in the createJwtToken function with API Hostname. For example, https://api-duohostname.com/oauth/v1/token. \n \u0026lt;JSON Web Key\u0026gt; in the getJwkName function with the configured JSON web key. \n \n Note: The iRule ID here is set as JWT_CREATE. You can rename the ID as desired. You specify this ID in the iRule Event agent in Visual Policy Editor. \n Note: The variables used in the below example are global, which may affect your performance. Refer to the K95240202: Understanding iRule variable scope article for further information on global variables, and determine if you use a local variable for your implementation. \n when ACCESS_POLICY_AGENT_EVENT {\n if { [ACCESS::policy agent_id] eq \"JWT_CREATE\" } {\n set duo_uname [ACCESS::session data get \"session.logon.last.username\"]\n\n # Inline logic for creating JWT\n set header \"{\\\"alg\\\":\\\"HS512\\\",\\\"typ\\\":\\\"JWT\\\"}\"\n set exp [expr {[clock seconds] + 900}]\n set client_id \"\u0026lt;Duo Client ID\u0026gt;\"\n\n set redirect_uri \"https://[ACCESS::session data get session.server.network.name]/oauth/client/redirect\"\n set payload \"{\\\"response_type\\\": \\\"code\\\",\\\"scope\\\":\\\"openid\\\",\\\"exp\\\":${exp},\\\"client_id\\\":\\\"${client_id}\\\",\\\"redirect_uri\\\":\\\"${redirect_uri}\\\",\\\"duo_uname\\\":\\\"${duo_uname}\\\"}\"\n\n set jwt_duo [ACCESS::oauth sign -header $header -payload $payload -alg HS512 -key \"\u0026lt;JSON Web Key\u0026gt;\"]\n ACCESS::session data set session.custom.jwt_duo $jwt_duo\n\n # JWT Token creation\n set aud \"\u0026lt;Duo API Hostname\u0026gt;\"\n set jti [string range [clock seconds] 0 31]\n set token_payload \"{\\\"sub\\\": \\\"${client_id}\\\",\\\"iss\\\":\\\"${client_id}\\\",\\\"aud\\\":\\\"${aud}\\\",\\\"exp\\\":${exp},\\\"jti\\\":\\\"${jti}\\\"}\"\n\n set jwt_duo_token [ACCESS::oauth sign -header $header -payload $token_payload -alg HS512 -key \"\u0026lt;JSON Web Key\u0026gt;\"]\n ACCESS::session data set session.custom.jwt_duo_token $jwt_duo_token\n }\n}\n\nwhen ACCESS_PER_REQUEST_AGENT_EVENT {\n if { [ACCESS::perflow get perflow.irule_agent_id] eq \"JWT_CREATE\" } {\n set duo_uname [ACCESS::session data get \"session.logon.last.username\"]\n\n set header \"{\\\"alg\\\":\\\"HS512\\\",\\\"typ\\\":\\\"JWT\\\"}\"\n set exp [expr {[clock seconds] + 900}]\n set client_id \"\u0026lt;Duo Client ID\u0026gt;\"\n\n set redirect_uri \"https://[ACCESS::session data get session.server.network.name]/oauth/client/redirect\"\n set payload \"{\\\"response_type\\\": \\\"code\\\",\\\"scope\\\":\\\"openid\\\",\\\"exp\\\":${exp},\\\"client_id\\\":\\\"${client_id}\\\",\\\"redirect_uri\\\":\\\"${redirect_uri}\\\",\\\"duo_uname\\\":\\\"${duo_uname}\\\"}\"\n\n set jwt_duo [ACCESS::oauth sign -header $header -payload $payload -alg HS512 -key \"\u0026lt;JSON Web Key\u0026gt;\"]\n ACCESS::perflow set perflow.custom $jwt_duo\n\n # JWT Token creation\n set aud \"\u0026lt;Duo API Hostname\u0026gt;\"\n set jti [string range [clock seconds] 0 31]\n set token_payload \"{\\\"sub\\\": \\\"${client_id}\\\",\\\"iss\\\":\\\"${client_id}\\\",\\\"aud\\\":\\\"${aud}\\\",\\\"exp\\\":${exp},\\\"jti\\\":\\\"${jti}\\\"}\"\n\n set jwt_duo_token [ACCESS::oauth sign -header $header -payload $token_payload -alg HS512 -key \"\u0026lt;JSON Web Key\u0026gt;\"]\n ACCESS::perflow set perflow.scratchpad $jwt_duo_token\n }\n} \n Note: iRule updated 11/27/2024 to eliminate CMP demotion. \n \n Figure 9: iRule screen \n 5. Click Finished. \n Create the appropriate access policy/policies on the BIG-IP system \n Per-request policy \n Skip this section for a per-session type deployment \n The per-request policy is used to perform secondary authentication with Duo. Configure the access policies through the access menu, using the Visual Policy Editor. The per-request access policy must have a subroutine with an iRule Event, Variable Assign, and an OAuth Client agent that requests authorization and tokens from an OAuth server. You may use other per-request policy items such as URL branching or Client Type to call Duo only for certain target URIs. \n Figure 10 shows a subroutine named duosubroutine in the per-request policy that handles Duo MFA authentication.\u0026nbsp; \n Figure 10: Per-request policy in Visual Policy Editor \n Configuring the iRule Event agent \n The iRule Event agent specifies the iRule ID to be executed for Duo integration. In the ID field, type the iRule ID as configured in the iRule.\u0026nbsp; \n Figure 11: iRule Event agent in Visual Policy Editor \n Configuring the Variable Assign agent \n The Variable Assign agent specifies the variables for token and redirect requests and assigns a value for Duo MFA in a subroutine. This is required only for per-request type deployment. Add sub-session variables as custom variables and assign their custom Tcl expressions as shown in Figure 12. \n \n subsession.custom.jwt_duo_token = return [mcget {perflow.scratchpad}] \n subsession.custom.jwt_duo = return [mcget {perflow.custom}] \n \n Figure 12: Variable Assign agent in Visual Policy Editor\u0026nbsp; \n Configuring the OAuth Client agent \n An OAuth Client agent requests authorization and tokens from the Duo server. Specify OAuth parameters as shown in Figure 13.\u0026nbsp; \n \n In the Server list, select the Duo server to which the OAuth client directs requests. \n In the Authentication Redirect Request list, select the auth-redirect-request configured earlier. \n In the Token Request list, select the token-request configured earlier. \n Some deployments may not need the additional information provided by OpenID Connect. You could, in that case, disable it. \n \n Figure 13: OAuth Client agent in Visual Policy Editor\u0026nbsp; \n Per-session policy \n Configure the Per Session policy as appropriate for your chosen deployment type. \n \n Per-request: The per-session policy must contain at least one logon page to set the username variable in the user’s session. Preferably it should also perform some type of primary authentication. This validated username is used later in the per-request policy. \n Per-session: The per-session policy is used for all authentication. A per-request policy is not used. \n \n Figures 14a and 14b show a per-session policy that runs when a client initiates a session. Depending on the actions you include in the access policy, it can authenticate the user and perform actions that populate session variables with data for use throughout the session. \n Figure 14a: Per-session policy in Visual Policy Editor performs both primary authentication and Duo authentication (for per-session use case) \n Figure 14b: Per-session policy in Visual Policy Editor performs primary authentication only (for per-request use case) \n Apply policy/policies and iRule to the APM virtual server \n Finally, apply the per-request policy, per-session policy, and iRule to the APM virtual server. You assign iRules as a resource to the virtual server that users connect. Configure the virtual server’s default pool to the protected local web resource. \n Apply policy/policies to the virtual server \n Per-request policy \n To attach policies to the virtual server: \n 1. On the Main tab, click Local Traffic \u0026gt; Virtual Servers. \n 2. Select the Virtual Server. \n 3. In the Access Policy section, select the policy you created. \n 4. Click Finished. \n Figure 15: Access Policy section in Virtual Server (per-request policy)\u0026nbsp; \n Per-session policy \n Figure 16 shows the Access Policy section in Virtual Server when the per-session policy is deployed. \n Figure 16: Access Policy section in Virtual Server (per-session policy) \n Apply iRule to the virtual server \n To attach the iRule to the virtual server:\u0026nbsp; \n 1. On the Main tab, click Local Traffic \u0026gt; Virtual Servers. \n 2. Select the Virtual Server. \n 3. Select the Resources tab. \n 4. Click Manage in the iRules section. \n 5. Select an iRule from the Available list and add it to the Enabled list. \n 6. Click Finished. ","body@stripHtml({\"removeProcessingText\":true,\"removeSpoilerMarkup\":true,\"removeTocMarkup\":true,\"truncateLength\":-1})@stringLength":"17974","kudosSumWeight":11,"repliesCount":52,"readOnly":false,"images":{"__typename":"AssociatedImageConnection","edges":[{"__typename":"AssociatedImageEdge","cursor":"MjUuMXwyLjF8b3wyNXxfTlZffDE","node":{"__ref":"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0yODM5NzEtMTE2MDdpMzQzRkI0NEVGQTdBMTBBNg?revision=8\"}"}},{"__typename":"AssociatedImageEdge","cursor":"MjUuMXwyLjF8b3wyNXxfTlZffDI","node":{"__ref":"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0yODM5NzEtMTQzOTNpRDlFNEY2NEMxNzUwMkYyMA?revision=8\"}"}},{"__typename":"AssociatedImageEdge","cursor":"MjUuMXwyLjF8b3wyNXxfTlZffDM","node":{"__ref":"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0yODM5NzEtMTI1M2k0QjREQjE0MDNGNzM0QjhB?revision=8\"}"}},{"__typename":"AssociatedImageEdge","cursor":"MjUuMXwyLjF8b3wyNXxfTlZffDQ","node":{"__ref":"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0yODM5NzEtNDYzMWk5MUM4QkE3MEQ4NDE3RkQz?revision=8\"}"}},{"__typename":"AssociatedImageEdge","cursor":"MjUuMXwyLjF8b3wyNXxfTlZffDU","node":{"__ref":"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0yODM5NzEtMTg2MGkxQUZDQzY2MjJFMUY2QzVG?revision=8\"}"}},{"__typename":"AssociatedImageEdge","cursor":"MjUuMXwyLjF8b3wyNXxfTlZffDY","node":{"__ref":"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0yODM5NzEtODc1MGk5MTFFRkE4QkE2RDY5MDc5?revision=8\"}"}},{"__typename":"AssociatedImageEdge","cursor":"MjUuMXwyLjF8b3wyNXxfTlZffDc","node":{"__ref":"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0yODM5NzEtMTA4NjNpNTYyM0FBN0Q5MDgyQzhCRQ?revision=8\"}"}},{"__typename":"AssociatedImageEdge","cursor":"MjUuMXwyLjF8b3wyNXxfTlZffDg","node":{"__ref":"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0yODM5NzEtNDIzMWk1NThDNzNERUVDNDM2QUYy?revision=8\"}"}},{"__typename":"AssociatedImageEdge","cursor":"MjUuMXwyLjF8b3wyNXxfTlZffDk","node":{"__ref":"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0yODM5NzEtTnpNQ2xh?revision=8\"}"}},{"__typename":"AssociatedImageEdge","cursor":"MjUuMXwyLjF8b3wyNXxfTlZffDEw","node":{"__ref":"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0yODM5NzEtNTYxNGlFQTIzRjk4OTQ3MDM5OThC?revision=8\"}"}},{"__typename":"AssociatedImageEdge","cursor":"MjUuMXwyLjF8b3wyNXxfTlZffDEx","node":{"__ref":"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0yODM5NzEtNzI1OGk2QTM3NzVDNjM1QkVBQUZD?revision=8\"}"}},{"__typename":"AssociatedImageEdge","cursor":"MjUuMXwyLjF8b3wyNXxfTlZffDEy","node":{"__ref":"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0yODM5NzEtMjAyaTI3MkExOEM2MjAwMjI3NUM?revision=8\"}"}},{"__typename":"AssociatedImageEdge","cursor":"MjUuMXwyLjF8b3wyNXxfTlZffDEz","node":{"__ref":"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0yODM5NzEtMzYzOGk1QTA0REIyQ0M5NjIzQjBC?revision=8\"}"}},{"__typename":"AssociatedImageEdge","cursor":"MjUuMXwyLjF8b3wyNXxfTlZffDE0","node":{"__ref":"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0yODM5NzEtODYzM2lGNzREQzI1Q0Q5M0VBMEI2?revision=8\"}"}},{"__typename":"AssociatedImageEdge","cursor":"MjUuMXwyLjF8b3wyNXxfTlZffDE1","node":{"__ref":"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0yODM5NzEtNjY2N2k1RTYxRDE4QjE3OTZCNkE1?revision=8\"}"}},{"__typename":"AssociatedImageEdge","cursor":"MjUuMXwyLjF8b3wyNXxfTlZffDE2","node":{"__ref":"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0yODM5NzEtNDYzNGlDRDdBN0JFQzVEOEMwODBB?revision=8\"}"}},{"__typename":"AssociatedImageEdge","cursor":"MjUuMXwyLjF8b3wyNXxfTlZffDE3","node":{"__ref":"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0yODM5NzEtNDE1aTRDODQ3ODk3QjU5REQ2Njc?revision=8\"}"}}],"totalCount":17,"pageInfo":{"__typename":"PageInfo","hasNextPage":false,"endCursor":null,"hasPreviousPage":false,"startCursor":null}},"videos":{"__typename":"VideoConnection","edges":[],"totalCount":0,"pageInfo":{"__typename":"PageInfo","hasNextPage":false,"endCursor":null,"hasPreviousPage":false,"startCursor":null}}},"Conversation:conversation:340017":{"__typename":"Conversation","id":"conversation:340017","topic":{"__typename":"ForumTopicMessage","uid":340017},"lastPostingActivityTime":"2025-02-25T09:19:54.894-08:00","solved":false},"User:user:426032":{"__typename":"User","uid":426032,"login":"alayne786","registrationData":{"__typename":"RegistrationData","status":null},"deleted":false,"avatar":{"__typename":"UserAvatar","url":"https://community.f5.com/t5/s/zihoc95639/m_assets/avatars/default/avatar-6.svg?time=0"},"id":"user:426032"},"ForumTopicMessage:message:340017":{"__typename":"ForumTopicMessage","subject":"SSL Renewal / Orchestration?","conversation":{"__ref":"Conversation:conversation:340017"},"id":"message:340017","revisionNum":1,"uid":340017,"depth":0,"board":{"__ref":"Forum:board:TechnicalForum"},"author":{"__ref":"User:user:426032"},"metrics":{"__typename":"MessageMetrics","views":24},"postTime":"2025-02-25T06:40:07.137-08:00","lastPublishTime":"2025-02-25T06:40:07.137-08:00","body@stripHtml({\"removeProcessingText\":true,\"removeSpoilerMarkup\":true,\"removeTocMarkup\":true,\"truncateLength\":-1})":" What are people who use F5 LTM using for SSL ordering/orchestration/renewal? We don't have BIGIP but are running BIGIP Os 16.x.x and I see some integration in the webUI for GOdady, Digicert., etc.. But we mostly use Globalsign / Globalsign API for cert ordering. I'm hoping to have an easy/secure way to renew/order/install certs to the F5 vCMP guests from Globalsign ","body@stripHtml({\"removeProcessingText\":true,\"removeSpoilerMarkup\":true,\"removeTocMarkup\":true,\"truncateLength\":-1})@stringLength":"369","kudosSumWeight":0,"repliesCount":2,"readOnly":false,"images":{"__typename":"AssociatedImageConnection","edges":[],"totalCount":0,"pageInfo":{"__typename":"PageInfo","hasNextPage":false,"endCursor":null,"hasPreviousPage":false,"startCursor":null}},"videos":{"__typename":"VideoConnection","edges":[],"totalCount":0,"pageInfo":{"__typename":"PageInfo","hasNextPage":false,"endCursor":null,"hasPreviousPage":false,"startCursor":null}}},"Conversation:conversation:339885":{"__typename":"Conversation","id":"conversation:339885","topic":{"__typename":"ForumTopicMessage","uid":339885},"lastPostingActivityTime":"2025-02-25T08:20:44.294-08:00","solved":false},"User:user:426073":{"__typename":"User","uid":426073,"login":"thekoreanguy","registrationData":{"__typename":"RegistrationData","status":null},"deleted":false,"avatar":{"__typename":"UserAvatar","url":"https://community.f5.com/t5/s/zihoc95639/m_assets/avatars/default/avatar-3.svg?time=0"},"id":"user:426073"},"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0zMzk4ODUtYmJKZG1N?revision=1\"}":{"__typename":"AssociatedImage","url":"https://community.f5.com/t5/s/zihoc95639/images/bS0zMzk4ODUtYmJKZG1N?revision=1","title":"image.png","associationType":"BODY","width":606,"height":250,"altText":""},"ForumTopicMessage:message:339885":{"__typename":"ForumTopicMessage","subject":"configure blocking response page","conversation":{"__ref":"Conversation:conversation:339885"},"id":"message:339885","revisionNum":1,"uid":339885,"depth":0,"board":{"__ref":"Forum:board:TechnicalForum"},"author":{"__ref":"User:user:426073"},"metrics":{"__typename":"MessageMetrics","views":44},"postTime":"2025-02-19T19:36:31.412-08:00","lastPublishTime":"2025-02-19T19:36:31.412-08:00","body@stripHtml({\"removeProcessingText\":true,\"removeSpoilerMarkup\":true,\"removeTocMarkup\":true,\"truncateLength\":-1})":" Hi, \u0026nbsp; I want to modify the blocking response page. \u0026nbsp;\"Your support ID is: \u0026lt;%TS.request.ID()%\u0026gt;\" As follows, I would like to modify the \u0026lt;%TS.request.ID()\u0026gt; part to output something like attack signature or detected keyword. How can I find that TS variable?? \u0026nbsp; ","body@stripHtml({\"removeProcessingText\":true,\"removeSpoilerMarkup\":true,\"removeTocMarkup\":true,\"truncateLength\":-1})@stringLength":"294","kudosSumWeight":0,"repliesCount":2,"readOnly":false,"images":{"__typename":"AssociatedImageConnection","edges":[{"__typename":"AssociatedImageEdge","cursor":"MjUuMXwyLjF8b3wyNXxfTlZffDE","node":{"__ref":"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0zMzk4ODUtYmJKZG1N?revision=1\"}"}}],"totalCount":1,"pageInfo":{"__typename":"PageInfo","hasNextPage":false,"endCursor":null,"hasPreviousPage":false,"startCursor":null}},"videos":{"__typename":"VideoConnection","edges":[],"totalCount":0,"pageInfo":{"__typename":"PageInfo","hasNextPage":false,"endCursor":null,"hasPreviousPage":false,"startCursor":null}}},"Conversation:conversation:316752":{"__typename":"Conversation","id":"conversation:316752","topic":{"__typename":"ForumTopicMessage","uid":316752},"lastPostingActivityTime":"2025-02-25T07:42:10.212-08:00","solved":true},"User:user:423977":{"__typename":"User","uid":423977,"login":"david_barrosvegas","registrationData":{"__typename":"RegistrationData","status":null},"deleted":false,"avatar":{"__typename":"UserAvatar","url":"https://community.f5.com/t5/s/zihoc95639/m_assets/avatars/default/avatar-7.svg?time=0"},"id":"user:423977"},"ForumTopicMessage:message:316752":{"__typename":"ForumTopicMessage","subject":"Unknown (Enabled) - Node address service checking is enabled, but result is not available yet","conversation":{"__ref":"Conversation:conversation:316752"},"id":"message:316752","revisionNum":1,"uid":316752,"depth":0,"board":{"__ref":"Forum:board:TechnicalForum"},"author":{"__ref":"User:user:423977"},"metrics":{"__typename":"MessageMetrics","views":2309},"postTime":"2023-06-12T10:58:15.600-07:00","lastPublishTime":"2023-06-12T10:58:15.600-07:00","body@stripHtml({\"removeProcessingText\":true,\"removeSpoilerMarkup\":true,\"removeTocMarkup\":true,\"truncateLength\":-1})":" Hi team good day could someone help me, I'm trying to configure the device (F5), but when I add the nodes I get the following message: \"Unknown (Enabled) - Node address service checking is enabled, but result is not available yet\" The\u0026nbsp; thing is that when I access via cli (ssh) and execute a telnet to the port it is successful, but the service is in a blue state.\u0026nbsp; I send screenshots of the error: Could you help me please, it's the first time I've configured it, thank you: \u0026nbsp; \u0026nbsp; successful connection telnet to port 7500 via cli (ssh): echo \"\" | nc -v -w 1 10.154.104.6 7500 Ncat: Version 6.40 ( http://nmap.org/ncat ) Ncat: Connected to 10.154.104.6:7500. \u0026lt;{25:20230612144900;27:99;31:1;26:Error;28:Format Error;32:1}Ncat: 1 bytes sent, 66 bytes received in 0.02 seconds. [neteng@F5-AR-HO-LB-1:ForcedOffline:Standalone] ~ # ","body@stripHtml({\"removeProcessingText\":true,\"removeSpoilerMarkup\":true,\"removeTocMarkup\":true,\"truncateLength\":-1})@stringLength":"862","kudosSumWeight":0,"repliesCount":3,"readOnly":false,"images":{"__typename":"AssociatedImageConnection","edges":[],"totalCount":0,"pageInfo":{"__typename":"PageInfo","hasNextPage":false,"endCursor":null,"hasPreviousPage":false,"startCursor":null}},"videos":{"__typename":"VideoConnection","edges":[],"totalCount":0,"pageInfo":{"__typename":"PageInfo","hasNextPage":false,"endCursor":null,"hasPreviousPage":false,"startCursor":null}}},"Conversation:conversation:339684":{"__typename":"Conversation","id":"conversation:339684","topic":{"__typename":"ForumTopicMessage","uid":339684},"lastPostingActivityTime":"2025-02-25T04:45:13.345-08:00","solved":true},"User:user:259586":{"__typename":"User","uid":259586,"login":"THE_BLUE","registrationData":{"__typename":"RegistrationData","status":null},"deleted":false,"avatar":{"__typename":"UserAvatar","url":"https://community.f5.com/t5/s/zihoc95639/m_assets/avatars/default/avatar-10.svg?time=0"},"id":"user:259586"},"ForumTopicMessage:message:339684":{"__typename":"ForumTopicMessage","subject":"VS STATISTICS","conversation":{"__ref":"Conversation:conversation:339684"},"id":"message:339684","revisionNum":1,"uid":339684,"depth":0,"board":{"__ref":"Forum:board:TechnicalForum"},"author":{"__ref":"User:user:259586"},"metrics":{"__typename":"MessageMetrics","views":107},"postTime":"2025-02-10T21:35:18.237-08:00","lastPublishTime":"2025-02-10T21:35:18.237-08:00","body@stripHtml({\"removeProcessingText\":true,\"removeSpoilerMarkup\":true,\"removeTocMarkup\":true,\"truncateLength\":-1})":" I want to know the statistics of a specific virtual server (VS) in BIG-IP. I ran the command below and received the result. My question is: are these details real-time or for a specific period? tmsh show /ltm virtual /Common/vs_name ","body@stripHtml({\"removeProcessingText\":true,\"removeSpoilerMarkup\":true,\"removeTocMarkup\":true,\"truncateLength\":-1})@stringLength":"235","kudosSumWeight":0,"repliesCount":10,"readOnly":false,"images":{"__typename":"AssociatedImageConnection","edges":[],"totalCount":0,"pageInfo":{"__typename":"PageInfo","hasNextPage":false,"endCursor":null,"hasPreviousPage":false,"startCursor":null}},"videos":{"__typename":"VideoConnection","edges":[],"totalCount":0,"pageInfo":{"__typename":"PageInfo","hasNextPage":false,"endCursor":null,"hasPreviousPage":false,"startCursor":null}}},"Conversation:conversation:310896":{"__typename":"Conversation","id":"conversation:310896","topic":{"__typename":"TkbTopicMessage","uid":310896},"lastPostingActivityTime":"2025-02-25T00:14:41.294-08:00","solved":false},"User:user:418945":{"__typename":"User","uid":418945,"login":"Russell_Moore","registrationData":{"__typename":"RegistrationData","status":null},"deleted":false,"avatar":{"__typename":"UserAvatar","url":"https://community.f5.com/t5/s/zihoc95639/images/dS00MTg5NDUtMjA0MzBpN0VCMjcyMjZCMEQxMkZEQg"},"id":"user:418945"},"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0zMTA4OTYtMjIxOThpNzA3MzI2QTg3Qjg3Qzg3Mg?revision=63\"}":{"__typename":"AssociatedImage","url":"https://community.f5.com/t5/s/zihoc95639/images/bS0zMTA4OTYtMjIxOThpNzA3MzI2QTg3Qjg3Qzg3Mg?revision=63","title":"CoverPhotos_0012_milad-fakurian-0IVgcwoJyYg-unsplash.jpg","associationType":"COVER","width":1000,"height":1000,"altText":""},"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0zMTA4OTYtMjI2ODlpODY4RDAwOEQyMjUwMTgxRA?revision=63\"}":{"__typename":"AssociatedImage","url":"https://community.f5.com/t5/s/zihoc95639/images/bS0zMTA4OTYtMjI2ODlpODY4RDAwOEQyMjUwMTgxRA?revision=63","title":"Russell_Moore_0-1677265202752.png","associationType":"BODY","width":682,"height":160,"altText":null},"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0zMTA4OTYtMjI2OTBpOEFDQUU5NTg2NjRFMEFEQw?revision=63\"}":{"__typename":"AssociatedImage","url":"https://community.f5.com/t5/s/zihoc95639/images/bS0zMTA4OTYtMjI2OTBpOEFDQUU5NTg2NjRFMEFEQw?revision=63","title":"Russell_Moore_1-1677265293816.png","associationType":"BODY","width":388,"height":168,"altText":null},"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0zMTA4OTYtMjI2OTFpQTdGNkUyNTY4MTIwMzIyNg?revision=63\"}":{"__typename":"AssociatedImage","url":"https://community.f5.com/t5/s/zihoc95639/images/bS0zMTA4OTYtMjI2OTFpQTdGNkUyNTY4MTIwMzIyNg?revision=63","title":"Russell_Moore_2-1677265342387.png","associationType":"BODY","width":330,"height":220,"altText":null},"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0zMTA4OTYtMjI3NDBpMUY2QzRFNUE4MTJBM0ZERg?revision=63\"}":{"__typename":"AssociatedImage","url":"https://community.f5.com/t5/s/zihoc95639/images/bS0zMTA4OTYtMjI3NDBpMUY2QzRFNUE4MTJBM0ZERg?revision=63","title":"Russell_Moore_0-1677600398436.png","associationType":"BODY","width":540,"height":288,"altText":null},"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0zMTA4OTYtMjI3NDFpMjRFQUREODFERDY1M0Y4Qw?revision=63\"}":{"__typename":"AssociatedImage","url":"https://community.f5.com/t5/s/zihoc95639/images/bS0zMTA4OTYtMjI3NDFpMjRFQUREODFERDY1M0Y4Qw?revision=63","title":"Russell_Moore_0-1677600763230.png","associationType":"BODY","width":616,"height":603,"altText":null},"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0zMTA4OTYtMjI3NDJpMDFGRjZDMTE1NTgxMzI1OA?revision=63\"}":{"__typename":"AssociatedImage","url":"https://community.f5.com/t5/s/zihoc95639/images/bS0zMTA4OTYtMjI3NDJpMDFGRjZDMTE1NTgxMzI1OA?revision=63","title":"Russell_Moore_0-1677600948053.png","associationType":"BODY","width":517,"height":403,"altText":null},"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0zMTA4OTYtMjI2OTVpQ0RGQzc5RUUyNUFEM0VBOQ?revision=63\"}":{"__typename":"AssociatedImage","url":"https://community.f5.com/t5/s/zihoc95639/images/bS0zMTA4OTYtMjI2OTVpQ0RGQzc5RUUyNUFEM0VBOQ?revision=63","title":"Russell_Moore_6-1677265664494.png","associationType":"BODY","width":518,"height":124,"altText":null},"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0zMTA4OTYtMjI3NDNpQkY0Q0JFRTQ3OEEwRUFGMQ?revision=63\"}":{"__typename":"AssociatedImage","url":"https://community.f5.com/t5/s/zihoc95639/images/bS0zMTA4OTYtMjI3NDNpQkY0Q0JFRTQ3OEEwRUFGMQ?revision=63","title":"Russell_Moore_0-1677601179814.png","associationType":"BODY","width":890,"height":1502,"altText":null},"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0zMTA4OTYtMjI2OTZpRUU4N0ZGQjk0MkYxRENDNg?revision=63\"}":{"__typename":"AssociatedImage","url":"https://community.f5.com/t5/s/zihoc95639/images/bS0zMTA4OTYtMjI2OTZpRUU4N0ZGQjk0MkYxRENDNg?revision=63","title":"Russell_Moore_7-1677265682488.png","associationType":"BODY","width":664,"height":494,"altText":null},"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0zMTA4OTYtMjI3NDRpOEZCRDA2QzE4NjcyOEZFQg?revision=63\"}":{"__typename":"AssociatedImage","url":"https://community.f5.com/t5/s/zihoc95639/images/bS0zMTA4OTYtMjI3NDRpOEZCRDA2QzE4NjcyOEZFQg?revision=63","title":"Russell_Moore_0-1677602117510.png","associationType":"BODY","width":1082,"height":222,"altText":null},"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0zMTA4OTYtMjI3NDVpNEJCODgzNjk2QkEzNzg4RA?revision=63\"}":{"__typename":"AssociatedImage","url":"https://community.f5.com/t5/s/zihoc95639/images/bS0zMTA4OTYtMjI3NDVpNEJCODgzNjk2QkEzNzg4RA?revision=63","title":"Russell_Moore_1-1677602256574.png","associationType":"BODY","width":1600,"height":1448,"altText":null},"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0zMTA4OTYtMjI3NDZpQkNBRDI4QzFFNjE0OEM2NA?revision=63\"}":{"__typename":"AssociatedImage","url":"https://community.f5.com/t5/s/zihoc95639/images/bS0zMTA4OTYtMjI3NDZpQkNBRDI4QzFFNjE0OEM2NA?revision=63","title":"Russell_Moore_2-1677602632462.png","associationType":"BODY","width":734,"height":370,"altText":null},"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0zMTA4OTYtMjI3NDlpMDRCOEZFNTMxMDg5MURCOQ?revision=63\"}":{"__typename":"AssociatedImage","url":"https://community.f5.com/t5/s/zihoc95639/images/bS0zMTA4OTYtMjI3NDlpMDRCOEZFNTMxMDg5MURCOQ?revision=63","title":"Russell_Moore_1-1677604435117.png","associationType":"BODY","width":1478,"height":354,"altText":null},"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0zMTA4OTYtMjI3NDhpNDZDRkNEMTcyNjJERjc0Ng?revision=63\"}":{"__typename":"AssociatedImage","url":"https://community.f5.com/t5/s/zihoc95639/images/bS0zMTA4OTYtMjI3NDhpNDZDRkNEMTcyNjJERjc0Ng?revision=63","title":"Russell_Moore_0-1677604396029.png","associationType":"BODY","width":1242,"height":450,"altText":null},"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0zMTA4OTYtMjI3NTBpMzM1MzgzNDYzRjA1NUZCRA?revision=63\"}":{"__typename":"AssociatedImage","url":"https://community.f5.com/t5/s/zihoc95639/images/bS0zMTA4OTYtMjI3NTBpMzM1MzgzNDYzRjA1NUZCRA?revision=63","title":"Russell_Moore_0-1677604745365.png","associationType":"BODY","width":1120,"height":386,"altText":null},"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0zMTA4OTYtMjI3NTFpMzMxNTVFNTEwNTY1OUI2RA?revision=63\"}":{"__typename":"AssociatedImage","url":"https://community.f5.com/t5/s/zihoc95639/images/bS0zMTA4OTYtMjI3NTFpMzMxNTVFNTEwNTY1OUI2RA?revision=63","title":"Russell_Moore_1-1677604846818.png","associationType":"BODY","width":1140,"height":400,"altText":null},"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0zMTA4OTYtMjI2OTlpMkFDRDQyQTFCMzAzMjQxMQ?revision=63\"}":{"__typename":"AssociatedImage","url":"https://community.f5.com/t5/s/zihoc95639/images/bS0zMTA4OTYtMjI2OTlpMkFDRDQyQTFCMzAzMjQxMQ?revision=63","title":"Russell_Moore_1-1677270126938.png","associationType":"BODY","width":536,"height":174,"altText":null},"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0zMTA4OTYtMjI3NjVpRTI4NEUyNzc0QzA5NTdFQw?revision=63\"}":{"__typename":"AssociatedImage","url":"https://community.f5.com/t5/s/zihoc95639/images/bS0zMTA4OTYtMjI3NjVpRTI4NEUyNzc0QzA5NTdFQw?revision=63","title":"Russell_Moore_0-1677607481906.png","associationType":"BODY","width":960,"height":1574,"altText":null},"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0zMTA4OTYtMjI3MDJpRjJDQkVENThGQzE0NkU0Nw?revision=63\"}":{"__typename":"AssociatedImage","url":"https://community.f5.com/t5/s/zihoc95639/images/bS0zMTA4OTYtMjI3MDJpRjJDQkVENThGQzE0NkU0Nw?revision=63","title":"Russell_Moore_0-1677272591295.png","associationType":"BODY","width":690,"height":462,"altText":null},"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0zMTA4OTYtMjI3MDNpMkQ2RUNGMkU3OTA1RkM2OA?revision=63\"}":{"__typename":"AssociatedImage","url":"https://community.f5.com/t5/s/zihoc95639/images/bS0zMTA4OTYtMjI3MDNpMkQ2RUNGMkU3OTA1RkM2OA?revision=63","title":"Russell_Moore_0-1677272801264.png","associationType":"BODY","width":518,"height":158,"altText":null},"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0zMTA4OTYtMjI3MDRpNTc4RjFGQUZERTJBOUVFNA?revision=63\"}":{"__typename":"AssociatedImage","url":"https://community.f5.com/t5/s/zihoc95639/images/bS0zMTA4OTYtMjI3MDRpNTc4RjFGQUZERTJBOUVFNA?revision=63","title":"Russell_Moore_1-1677272922466.png","associationType":"BODY","width":1102,"height":236,"altText":null},"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0zMTA4OTYtMjI3MDVpQTY2QkVENTg0QUJGQ0E1Ng?revision=63\"}":{"__typename":"AssociatedImage","url":"https://community.f5.com/t5/s/zihoc95639/images/bS0zMTA4OTYtMjI3MDVpQTY2QkVENTg0QUJGQ0E1Ng?revision=63","title":"Russell_Moore_2-1677272922471.png","associationType":"BODY","width":801,"height":155,"altText":null},"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0zMTA4OTYtMjI3MDZpOUQxNkNBNUYyNTUwQzJGQQ?revision=63\"}":{"__typename":"AssociatedImage","url":"https://community.f5.com/t5/s/zihoc95639/images/bS0zMTA4OTYtMjI3MDZpOUQxNkNBNUYyNTUwQzJGQQ?revision=63","title":"Russell_Moore_3-1677272922474.png","associationType":"BODY","width":929,"height":101,"altText":null},"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0zMTA4OTYtMjI3MDdpMTAzMTg1QzQ4QzEyMTA2Qg?revision=63\"}":{"__typename":"AssociatedImage","url":"https://community.f5.com/t5/s/zihoc95639/images/bS0zMTA4OTYtMjI3MDdpMTAzMTg1QzQ4QzEyMTA2Qg?revision=63","title":"Russell_Moore_0-1677275408860.png","associationType":"BODY","width":2580,"height":374,"altText":null},"TkbTopicMessage:message:310896":{"__typename":"TkbTopicMessage","subject":"F5 BIG-IP Access Policy Manager (APM) Machine Tunnels for Windows","conversation":{"__ref":"Conversation:conversation:310896"},"id":"message:310896","revisionNum":63,"uid":310896,"depth":0,"board":{"__ref":"Tkb:board:TechnicalArticles"},"author":{"__ref":"User:user:418945"},"teaser@stripHtml({\"removeProcessingText\":true,\"truncateLength\":-1})":" Would you like for your windows clients to call home securely? Don't leave client machines out in the cold. F5 APM with Machine Tunnels can keep your clients up-to-date and in sync.\u0026nbsp; ","introduction":"","metrics":{"__typename":"MessageMetrics","views":5281},"postTime":"2023-03-31T10:36:09.305-07:00","lastPublishTime":"2023-04-03T11:05:25.997-07:00","body@stripHtml({\"removeProcessingText\":true,\"removeSpoilerMarkup\":true,\"removeTocMarkup\":true,\"truncateLength\":-1})":" Introduction Machine Tunnels vs. other Access Policies Machine Tunnel Authentication Access control is critical An example configuration Step 1 Start the Device Wizard Step 2 Name our new Policy Step 3 Set Authentication Step 4 Client Address Pool Step 5 Network Access Step 6 DNS Step 7 Virtual Server address Step 8 Summary Adding On-Demand Certificate Authentication to our policy Step 1 Add Client Type to Policy Step 2 Select the client types. Step 3 Add On-Demand Cert Auth Step 4 Complete Policy Changes Disable compression for larger deployments Certificates Certificate Authority Certificate for the VPN Services VIP Create a Client SSL Profile Client Certificates Virtual Service Configuration Client Setup and Configuration Customize and Download Windows Client Package Configuration of the client Machine Tunnels service F5MachineTunnelInfo.exe Registry Configuration Your Machine Tunnel is ready Optional but recommended items Troubleshooting \n Introduction \n F5 BIG-IP Access Policy Manager (APM) feature Machine Tunnels is a powerful tool to address access needs without user interaction on the Microsoft Windows platform. Many use cases require such access. For example, in a recent interaction with a customer, it became evident that the end users needed to be able to access Active Directory for authentication and initial password changes, both for new employees or after a wipe and reprovision occurring for existing users. Others may want remote systems to boot up and connect over untrusted networks for command and control—devices such as remote signage, ATMs,\u0026nbsp; vending systems, surveillance systems, etc.\u0026nbsp; \n The BIG-IP APM Machine Tunnel is separate from but partnered with the more traditional BIG-IP Edge Client or app access policies that end users use. But, this article will focus only on the Machine Tunnels component. Still, you can deploy a machine tunnel policy along with the other types, and the BIG-IP APM will pause and restart the machine tunnel automatically as required for your sessions. \n \u0026nbsp; \n Machine Tunnels vs. other Access Policies \n Machine Tunnels behave, are configured, and managed differently than typical access policies. If you've configured, troubleshot, and managed Edge Client and Access Policies, you are familiar with the tools and the locations of data and logs for those purposes. Due to the nature of machine tunnels, the same information can't be and isn't stored in the same places. The logs and binaries are in different places. For example, Machine Tunnel logs are found in C:\\Windows\\Temp or the defined system temp folder. \n In contrast, the Edge client stores its logs in a temporary folder within the %APPDATA% structure under the user logged into the service. Executable parts of the two clients are in different locations as well. Machine Tunnels binaries live in C:\\Windows\\sysWOW64, and the Edge VPN client uses\u0026nbsp;C:\\Program Files (x86)\\F5 VPN. \n Machine Tunnel Authentication \n Authentication for Machine Tunnels can be done with certificates only via On-Demand Certificate Auth (ODCA). There can be some confusion as other access policies allow you to use\u0026nbsp;Machine Certificate Authentication (MCA). MCA isn't compatible with Machine Tunnels. Machine Tunnels authentication can consist of the following steps: \n \n The Machine Tunnel agent attempts to connect to the hostname of the VPN service. Then, the Machine Tunnels agent validates the VPN service's server certificate. \n The Machine Tunnel agent asserts a client certificate, and the BIG-IP APM validates that client certificate with the configured CA. \n The Machine Tunnel agent supplies a userID and password, and the APM validates these credentials against the configured identity store. \n \n The user of the different authentication credentials is optional. Using both certificate and userid/password is the most secure method. We cover only the certificate authentication method in the example within this article. Machine Tunnel certificates can be stored in the Windows system default location or a Machine Tunnels specific location. The userID and Passwords are stored in encrypted hashes. \n Access control is critical \n Machine Tunnels are automatic; the client can often be unattended in untrusted environments. With this in mind, thoughtfulness about access controls and available services to a machine tunnel profile must be a priority. It is recommended to assign very limited network access that achieves the requirements. \n An example configuration \n We can use one of the Device Wizard methods to bootstrap many items we will need to configure a Maching Tunnels profile and then discuss the additional things we'll need to configure. \n Step 1 Start the Device Wizard \n The easiest way to get BIG-IP APM components set up and ready is to use the Wizard, which we will use in this example. \n \n Step 2 Name our new Policy \n We will name our policy from here and uncheck \"Enable Antivirus Check in Access Policy\" to keep things simple. When building a complex policy, I encourage you to start with the most straightforward configuration and establish the essential work. Then build upon those successes. \n \n Step 3 Set Authentication \n For authentication, we are going to select \"No Authentication.\" That doesn't sound good, but we will fix that soon.\u0026nbsp; \n \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \n Step 4 Client Address Pool \n Now we will configure a client address pool. If you want to keep the source IP available to your other systems for clients connected through the BIG-IP APM, please use a range that can be appropriately routed on your network. \n \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \n Step 5 Network Access \n Defining our Network Access is an area to give some consideration for sure. It's a good idea to isolate what networks you wish the client to talk to during the Machine Tunnels stage of connectivity. You may also want to force all traffic over the tunnel to avoid the client leaking network data on public networks. Alternatively, you may not want the excess traffic on your system. \n \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \n Step 6 DNS \n The DNS server definition is essential for a lot of reasons. First, the client will try to reach services such as Active Directory by name, and a resolution is necessary. \n \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \n Step 7 Virtual Server address \n We must define a Virtual Server to accept the inbound session requests. You should not need a redirect server, so you can uncheck that option to avoid configuration clutter. \n \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \n Step 8 Summary \n Proceeding to click through \"NEXT\" twice we get a summary of our objects created. \n \n \u0026nbsp; \n \n \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \n Adding On-Demand Certificate Authentication to our policy \n We can open the Visual Policy Editor, add the Machine Tunnel client type, and set up the ODCA configuration. Then, head to\u0026nbsp;Access\u0026nbsp;\u0026nbsp;\u0026nbsp;››\u0026nbsp;\u0026nbsp;Profiles / Policies:\u0026nbsp;Access Profiles (Per-Session Policies)\u0026nbsp;and open the new profile created. \n \n Step 1 Add Client Type to Policy \n Click on the first \"+\" symbol before \"Login Page.\" Then, in the Search bar, type \"Client Type,\" select that and click \"add item.\"\u0026nbsp; \n \n For now, we will select all client types and delete them except for the \"Machine Tunnel\" and \"Edge Client\" types. The latter is a placeholder for the future expansion of our access policy and won't be covered in this article. Now click \"Save,\" and we should have a policy that looks like the following: \n \n Step 2 Select the client types. \n Click on the \"+\" symbol just to the right of the \"Machine Tunnel\" label. Then, in the search field, type \"On-Demand,\" select \"On-Demand Cert Auth,\" and click \"Add Item.\" \n \n Step 3 Add On-Demand Cert Auth \n Click on the On-Demand Cert Auth link that's been added to our policy and change the setting from \"Request\" to \"Require,\" and click \"Save.\" \n \n The policy should appear as follows. \n \n Step 4 Complete Policy Changes \n On the right, on the \"Successful\" branch from \"On-Demand Cert Auth,\" click on \"Deny\" and change that to \"Allow\" and save, which should end our policy changes and appear as the following. \n \n \u0026nbsp; \n Disable compression for larger deployments \n Compression can impact your BIG-IP APM's ability to handle many clients. So in\u0026nbsp;this article, the recommendation is to disable compression, which we will do in our access policy. \n \n \u0026nbsp; \n Certificates \n Certificate Authority \n The root, intermediate, and signing certificates required to validate your client certificates must be concatenated and imported into your BIG-IP APM. This CA bundle will then need to be used to configure the client SSL profile of the VIP. You will also want a valid certificate installed in the SSL profile, one your clients can validate. You can see your configured CAs here\u0026nbsp;Local Traffic\u0026nbsp;\u0026nbsp;\u0026nbsp;››\u0026nbsp;\u0026nbsp;Profiles:\u0026nbsp;SSL:\u0026nbsp;Certificate Authority.\u0026nbsp; \n \u0026nbsp; \n Certificate for the VPN Services VIP \n Follow your usual process to request and issue a valid certificate for this service. Be sure that the conical names are proper and that any SAN entries are made if the service will be called by more than one DNS name. \n \u0026nbsp; \n Create a Client SSL Profile \n Once you have followed the instructions in the link above for creating your CA and produced and imported your service certificate, we can create the Client SSL profile.\u0026nbsp;Local Traffic\u0026nbsp;\u0026nbsp;\u0026nbsp;››\u0026nbsp;\u0026nbsp;Profiles:\u0026nbsp;SSL:\u0026nbsp;Client\u0026nbsp; \n You must add your service certificate and key within the \"Certificate Key Chain.\" Set the \"Client Certificate\" to \"ignore\" because our APM policy will authenticate the client certificate. As well as set the \"Trusted Certificates Authorities\" and Advertised Certificate Authorities\" to the CA you created in the step above. \n \n Client Certificates \n How you go about the delivery and installation of the client certificates is beyond the scope of this article. There are two places where the certificate can be stored, and the machine tunnels client can be set to use either location. We will cover configuring the location to use later in this article. It is assumed the client certificates have been issued and stored in the default location on your Windows clients. \n Virtual Service Configuration \n The virtual server should have been built during the device configuration wizard steps above. Open that virtual server and configure it with the client ssl profile you've created. Make sure the policies for APM are applied and save those settings.\u0026nbsp; This completes the APM portion of the configuration except for the client package and download of that package cover next. \n Client Setup and Configuration \n Customize and Download Windows Client Package \n In the\u0026nbsp;Access\u0026nbsp;\u0026nbsp;\u0026nbsp;››\u0026nbsp;\u0026nbsp;Connectivity / VPN:\u0026nbsp;Connectivity:\u0026nbsp;Profiles section, select our policy name and at the bottom, select Customize Package. Add the Machine Tunnel Service to the package and retrieve the installation package to deploy onto your clients. \n You can use the installer to install the machine tunnel service on the user's machine. The installer will install the following components on the user's Machine under the C:\\Windows\\SysWow64 directory \n \n \u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp; F5MachineTunnelService.exe (Machine Tunnels service) \n \u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp; F5MachineTunnelInfo.exe (Command line tool for configuring machine Tunnels) \n \u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp; Register F5MachineTunnelService.exe as a windows service under the system account \n \n Configuration of the client Machine Tunnels service \n There are primarily two ways to configure the Machine Tunnels service on the client side. Either through the F5MachineTunnelInfo.exe tool or via direct editing of the registry. The latter may simplify deployments where registry settings can be distributed with Active Directory policies. \n F5MachineTunnelInfo.exe \n As of the publishing of this article, the help for this tool is as follows: \n \n To configure the certificate store to use the default Windows location for machine certificates, the command would look as follows: \n From the command prompt that is run as an administrator.\u0026nbsp; “cd C:\\Windows\\SysWow6.” \n Type “F5MachineTunnelInfo.exe --set_client_certstore system my” to set the client certificate store to use. \n You can also print the client’s current configuration: \n \n Registry Configuration \n You must create or set up the registry keys and configure authentication on the client through the above tool or directly in the registry. \n \n Create a new Key under HKLM\\SYSTEM\\CurrentControlSet\\services\\F5MachineTunnelService called \"Parameters.\" \n Create a Key under that called \"VPNServers\" \n New \u0026gt; String value called \"Server0\" with https://\u0026lt;VS_IP/NAME\u0026gt; as value for testing an IP is fine, but you will want to use a name for production so that certificates can be validated \n HKLM\\SYSTEM\\CurrentControlSet\\services\\F5MachineTunnelService\\Parameters\\IgnoreSSLErrors REG_DWORD = 1 \n \n \n Your Machine Tunnel is ready \n Once you've completed all client-side configurations, you can restart the client. \n Now that you've configured everything, you should see sessions for clients running the machine tunnel configuration.\u0026nbsp; \n \n You can move on to more advanced configurations, including adding webtop, client or application access profiles, etc.\u0026nbsp; \n Optional but recommended items \n Configure supported ciphers to those that are hardware-accelerated for the platform - https://my.f5.com/manage/s/article/K13213 \n Updating the client installer package -\u0026nbsp; https://my.f5.com/manage/s/article/K52547540 \n Troubleshooting\u0026nbsp; \n Several possible things can go wrong with Machine Tunnel access that prevents it from establishing a tunnel. It has been seen that SSL errors are the primary culprit of issues. Setting \"IgnoreSSLErrors\" to \"1\" in the registry is one way to determine if an SSL issue is the cause of your problems. This option is not set in production, or certificate validation will be ignored. The other options are to review the BIG-IP APM logs on the F5 appliance and the client logs. The client logs should be in the system temp folder, and in the case of this example, they are found in the file \"C:\\Windows\\Temp\\F5MachineTunnelService\". ","body@stripHtml({\"removeProcessingText\":true,\"removeSpoilerMarkup\":true,\"removeTocMarkup\":true,\"truncateLength\":-1})@stringLength":"14532","kudosSumWeight":5,"repliesCount":1,"readOnly":false,"images":{"__typename":"AssociatedImageConnection","edges":[{"__typename":"AssociatedImageEdge","cursor":"MjUuMXwyLjF8b3wyNXxfTlZffDE","node":{"__ref":"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0zMTA4OTYtMjIxOThpNzA3MzI2QTg3Qjg3Qzg3Mg?revision=63\"}"}},{"__typename":"AssociatedImageEdge","cursor":"MjUuMXwyLjF8b3wyNXxfTlZffDI","node":{"__ref":"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0zMTA4OTYtMjI2ODlpODY4RDAwOEQyMjUwMTgxRA?revision=63\"}"}},{"__typename":"AssociatedImageEdge","cursor":"MjUuMXwyLjF8b3wyNXxfTlZffDM","node":{"__ref":"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0zMTA4OTYtMjI2OTBpOEFDQUU5NTg2NjRFMEFEQw?revision=63\"}"}},{"__typename":"AssociatedImageEdge","cursor":"MjUuMXwyLjF8b3wyNXxfTlZffDQ","node":{"__ref":"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0zMTA4OTYtMjI2OTFpQTdGNkUyNTY4MTIwMzIyNg?revision=63\"}"}},{"__typename":"AssociatedImageEdge","cursor":"MjUuMXwyLjF8b3wyNXxfTlZffDU","node":{"__ref":"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0zMTA4OTYtMjI3NDBpMUY2QzRFNUE4MTJBM0ZERg?revision=63\"}"}},{"__typename":"AssociatedImageEdge","cursor":"MjUuMXwyLjF8b3wyNXxfTlZffDY","node":{"__ref":"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0zMTA4OTYtMjI3NDFpMjRFQUREODFERDY1M0Y4Qw?revision=63\"}"}},{"__typename":"AssociatedImageEdge","cursor":"MjUuMXwyLjF8b3wyNXxfTlZffDc","node":{"__ref":"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0zMTA4OTYtMjI3NDJpMDFGRjZDMTE1NTgxMzI1OA?revision=63\"}"}},{"__typename":"AssociatedImageEdge","cursor":"MjUuMXwyLjF8b3wyNXxfTlZffDg","node":{"__ref":"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0zMTA4OTYtMjI2OTVpQ0RGQzc5RUUyNUFEM0VBOQ?revision=63\"}"}},{"__typename":"AssociatedImageEdge","cursor":"MjUuMXwyLjF8b3wyNXxfTlZffDk","node":{"__ref":"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0zMTA4OTYtMjI3NDNpQkY0Q0JFRTQ3OEEwRUFGMQ?revision=63\"}"}},{"__typename":"AssociatedImageEdge","cursor":"MjUuMXwyLjF8b3wyNXxfTlZffDEw","node":{"__ref":"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0zMTA4OTYtMjI2OTZpRUU4N0ZGQjk0MkYxRENDNg?revision=63\"}"}},{"__typename":"AssociatedImageEdge","cursor":"MjUuMXwyLjF8b3wyNXxfTlZffDEx","node":{"__ref":"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0zMTA4OTYtMjI3NDRpOEZCRDA2QzE4NjcyOEZFQg?revision=63\"}"}},{"__typename":"AssociatedImageEdge","cursor":"MjUuMXwyLjF8b3wyNXxfTlZffDEy","node":{"__ref":"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0zMTA4OTYtMjI3NDVpNEJCODgzNjk2QkEzNzg4RA?revision=63\"}"}},{"__typename":"AssociatedImageEdge","cursor":"MjUuMXwyLjF8b3wyNXxfTlZffDEz","node":{"__ref":"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0zMTA4OTYtMjI3NDZpQkNBRDI4QzFFNjE0OEM2NA?revision=63\"}"}},{"__typename":"AssociatedImageEdge","cursor":"MjUuMXwyLjF8b3wyNXxfTlZffDE0","node":{"__ref":"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0zMTA4OTYtMjI3NDlpMDRCOEZFNTMxMDg5MURCOQ?revision=63\"}"}},{"__typename":"AssociatedImageEdge","cursor":"MjUuMXwyLjF8b3wyNXxfTlZffDE1","node":{"__ref":"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0zMTA4OTYtMjI3NDhpNDZDRkNEMTcyNjJERjc0Ng?revision=63\"}"}},{"__typename":"AssociatedImageEdge","cursor":"MjUuMXwyLjF8b3wyNXxfTlZffDE2","node":{"__ref":"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0zMTA4OTYtMjI3NTBpMzM1MzgzNDYzRjA1NUZCRA?revision=63\"}"}},{"__typename":"AssociatedImageEdge","cursor":"MjUuMXwyLjF8b3wyNXxfTlZffDE3","node":{"__ref":"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0zMTA4OTYtMjI3NTFpMzMxNTVFNTEwNTY1OUI2RA?revision=63\"}"}},{"__typename":"AssociatedImageEdge","cursor":"MjUuMXwyLjF8b3wyNXxfTlZffDE4","node":{"__ref":"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0zMTA4OTYtMjI2OTlpMkFDRDQyQTFCMzAzMjQxMQ?revision=63\"}"}},{"__typename":"AssociatedImageEdge","cursor":"MjUuMXwyLjF8b3wyNXxfTlZffDE5","node":{"__ref":"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0zMTA4OTYtMjI3NjVpRTI4NEUyNzc0QzA5NTdFQw?revision=63\"}"}},{"__typename":"AssociatedImageEdge","cursor":"MjUuMXwyLjF8b3wyNXxfTlZffDIw","node":{"__ref":"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0zMTA4OTYtMjI3MDJpRjJDQkVENThGQzE0NkU0Nw?revision=63\"}"}},{"__typename":"AssociatedImageEdge","cursor":"MjUuMXwyLjF8b3wyNXxfTlZffDIx","node":{"__ref":"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0zMTA4OTYtMjI3MDNpMkQ2RUNGMkU3OTA1RkM2OA?revision=63\"}"}},{"__typename":"AssociatedImageEdge","cursor":"MjUuMXwyLjF8b3wyNXxfTlZffDIy","node":{"__ref":"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0zMTA4OTYtMjI3MDRpNTc4RjFGQUZERTJBOUVFNA?revision=63\"}"}},{"__typename":"AssociatedImageEdge","cursor":"MjUuMXwyLjF8b3wyNXxfTlZffDIz","node":{"__ref":"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0zMTA4OTYtMjI3MDVpQTY2QkVENTg0QUJGQ0E1Ng?revision=63\"}"}},{"__typename":"AssociatedImageEdge","cursor":"MjUuMXwyLjF8b3wyNXxfTlZffDI0","node":{"__ref":"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0zMTA4OTYtMjI3MDZpOUQxNkNBNUYyNTUwQzJGQQ?revision=63\"}"}},{"__typename":"AssociatedImageEdge","cursor":"MjUuMXwyLjF8b3wyNXxfTlZffDI1","node":{"__ref":"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0zMTA4OTYtMjI3MDdpMTAzMTg1QzQ4QzEyMTA2Qg?revision=63\"}"}}],"totalCount":25,"pageInfo":{"__typename":"PageInfo","hasNextPage":false,"endCursor":null,"hasPreviousPage":false,"startCursor":null}},"videos":{"__typename":"VideoConnection","edges":[],"totalCount":0,"pageInfo":{"__typename":"PageInfo","hasNextPage":false,"endCursor":null,"hasPreviousPage":false,"startCursor":null}}},"Conversation:conversation:339884":{"__typename":"Conversation","id":"conversation:339884","topic":{"__typename":"TkbTopicMessage","uid":339884},"lastPostingActivityTime":"2025-02-24T19:51:18.469-08:00","solved":false},"User:user:421692":{"__typename":"User","uid":421692,"login":"Jennifer_Yeung","registrationData":{"__typename":"RegistrationData","status":null},"deleted":false,"avatar":{"__typename":"UserAvatar","url":"https://community.f5.com/t5/s/zihoc95639/images/dS00MjE2OTItMjM4NjlpMkQ2RjRFMUZDNDMxN0IxRA"},"id":"user:421692"},"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0zMzk4ODQtWVU1amF6?revision=25\"}":{"__typename":"AssociatedImage","url":"https://community.f5.com/t5/s/zihoc95639/images/bS0zMzk4ODQtWVU1amF6?revision=25","title":"pic1.png","associationType":"BODY","width":2782,"height":1392,"altText":""},"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0zMzk4ODQtYXEzVmNL?revision=25\"}":{"__typename":"AssociatedImage","url":"https://community.f5.com/t5/s/zihoc95639/images/bS0zMzk4ODQtYXEzVmNL?revision=25","title":"new-pic2.png","associationType":"BODY","width":2932,"height":1472,"altText":""},"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0zMzk4ODQtSmJNZ3Ry?revision=25\"}":{"__typename":"AssociatedImage","url":"https://community.f5.com/t5/s/zihoc95639/images/bS0zMzk4ODQtSmJNZ3Ry?revision=25","title":"pic3.png","associationType":"BODY","width":1343,"height":751,"altText":""},"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0zMzk4ODQtSVJiZ3dK?revision=25\"}":{"__typename":"AssociatedImage","url":"https://community.f5.com/t5/s/zihoc95639/images/bS0zMzk4ODQtSVJiZ3dK?revision=25","title":"pic4.png","associationType":"BODY","width":1098,"height":661,"altText":""},"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0zMzk4ODQtTHA2SDc0?revision=25\"}":{"__typename":"AssociatedImage","url":"https://community.f5.com/t5/s/zihoc95639/images/bS0zMzk4ODQtTHA2SDc0?revision=25","title":"pic5.png","associationType":"BODY","width":1032,"height":265,"altText":""},"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0zMzk4ODQtdTFySzhB?revision=25\"}":{"__typename":"AssociatedImage","url":"https://community.f5.com/t5/s/zihoc95639/images/bS0zMzk4ODQtdTFySzhB?revision=25","title":"pic6.png","associationType":"BODY","width":1289,"height":380,"altText":""},"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0zMzk4ODQtN1dLVFhZ?revision=25\"}":{"__typename":"AssociatedImage","url":"https://community.f5.com/t5/s/zihoc95639/images/bS0zMzk4ODQtN1dLVFhZ?revision=25","title":"pic7.png","associationType":"BODY","width":1315,"height":736,"altText":""},"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0zMzk4ODQtS3RzbXJl?revision=25\"}":{"__typename":"AssociatedImage","url":"https://community.f5.com/t5/s/zihoc95639/images/bS0zMzk4ODQtS3RzbXJl?revision=25","title":"pic8.png","associationType":"BODY","width":1211,"height":744,"altText":""},"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0zMzk4ODQtc0l2OTBl?revision=25\"}":{"__typename":"AssociatedImage","url":"https://community.f5.com/t5/s/zihoc95639/images/bS0zMzk4ODQtc0l2OTBl?revision=25","title":"new-pic10.png","associationType":"BODY","width":2306,"height":1119,"altText":""},"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0zMzk4ODQtNGlPcnZQ?revision=25\"}":{"__typename":"AssociatedImage","url":"https://community.f5.com/t5/s/zihoc95639/images/bS0zMzk4ODQtNGlPcnZQ?revision=25","title":"new-pic11.png","associationType":"BODY","width":1917,"height":1060,"altText":""},"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0zMzk4ODQtbUtVeVYz?revision=25\"}":{"__typename":"AssociatedImage","url":"https://community.f5.com/t5/s/zihoc95639/images/bS0zMzk4ODQtbUtVeVYz?revision=25","title":"new-pic12.png","associationType":"BODY","width":2460,"height":1262,"altText":""},"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0zMzk4ODQtRVBsOVg3?revision=25\"}":{"__typename":"AssociatedImage","url":"https://community.f5.com/t5/s/zihoc95639/images/bS0zMzk4ODQtRVBsOVg3?revision=25","title":"pic13.png","associationType":"BODY","width":2860,"height":1404,"altText":""},"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0zMzk4ODQtdUJkT0V0?revision=25\"}":{"__typename":"AssociatedImage","url":"https://community.f5.com/t5/s/zihoc95639/images/bS0zMzk4ODQtdUJkT0V0?revision=25","title":"pic14.png","associationType":"BODY","width":2534,"height":416,"altText":""},"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0zMzk4ODQtd2YxMEQ3?revision=25\"}":{"__typename":"AssociatedImage","url":"https://community.f5.com/t5/s/zihoc95639/images/bS0zMzk4ODQtd2YxMEQ3?revision=25","title":"pic15.png","associationType":"BODY","width":3178,"height":1176,"altText":""},"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0zMzk4ODQtZDF2R25C?revision=25\"}":{"__typename":"AssociatedImage","url":"https://community.f5.com/t5/s/zihoc95639/images/bS0zMzk4ODQtZDF2R25C?revision=25","title":"pic16-new.png","associationType":"BODY","width":3074,"height":574,"altText":""},"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0zMzk4ODQtdGV0Sk53?revision=25\"}":{"__typename":"AssociatedImage","url":"https://community.f5.com/t5/s/zihoc95639/images/bS0zMzk4ODQtdGV0Sk53?revision=25","title":"pic17-new.png","associationType":"BODY","width":1920,"height":892,"altText":""},"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0zMzk4ODQtZjdZOEU3?revision=25\"}":{"__typename":"AssociatedImage","url":"https://community.f5.com/t5/s/zihoc95639/images/bS0zMzk4ODQtZjdZOEU3?revision=25","title":"pic18.png","associationType":"BODY","width":2762,"height":1580,"altText":""},"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0zMzk4ODQtV2xodXRO?revision=25\"}":{"__typename":"AssociatedImage","url":"https://community.f5.com/t5/s/zihoc95639/images/bS0zMzk4ODQtV2xodXRO?revision=25","title":"pic17.png","associationType":"BODY","width":998,"height":720,"altText":""},"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0zMzk4ODQtS2ZzOW5O?revision=25\"}":{"__typename":"AssociatedImage","url":"https://community.f5.com/t5/s/zihoc95639/images/bS0zMzk4ODQtS2ZzOW5O?revision=25","title":"pic18.png","associationType":"BODY","width":1730,"height":249,"altText":""},"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0zMzk4ODQta2xHUGlO?revision=25\"}":{"__typename":"AssociatedImage","url":"https://community.f5.com/t5/s/zihoc95639/images/bS0zMzk4ODQta2xHUGlO?revision=25","title":"pic19.png","associationType":"BODY","width":1018,"height":851,"altText":""},"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0zMzk4ODQtbmp0UFR4?revision=25\"}":{"__typename":"AssociatedImage","url":"https://community.f5.com/t5/s/zihoc95639/images/bS0zMzk4ODQtbmp0UFR4?revision=25","title":"pic22.png","associationType":"BODY","width":2754,"height":1646,"altText":""},"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0zMzk4ODQtZU05eG1o?revision=25\"}":{"__typename":"AssociatedImage","url":"https://community.f5.com/t5/s/zihoc95639/images/bS0zMzk4ODQtZU05eG1o?revision=25","title":"pic21-a.png","associationType":"BODY","width":1568,"height":607,"altText":""},"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0zMzk4ODQtWE1saWtw?revision=25\"}":{"__typename":"AssociatedImage","url":"https://community.f5.com/t5/s/zihoc95639/images/bS0zMzk4ODQtWE1saWtw?revision=25","title":"pic21.png","associationType":"BODY","width":1197,"height":417,"altText":""},"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0zMzk4ODQtTllHYk9Z?revision=25\"}":{"__typename":"AssociatedImage","url":"https://community.f5.com/t5/s/zihoc95639/images/bS0zMzk4ODQtTllHYk9Z?revision=25","title":"pic24.png","associationType":"BODY","width":2968,"height":466,"altText":""},"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0zMzk4ODQtclVkT3E3?revision=25\"}":{"__typename":"AssociatedImage","url":"https://community.f5.com/t5/s/zihoc95639/images/bS0zMzk4ODQtclVkT3E3?revision=25","title":"pic25.png","associationType":"BODY","width":1814,"height":366,"altText":""},"TkbTopicMessage:message:339884":{"__typename":"TkbTopicMessage","subject":"Secure AI RAG using F5 Distributed Cloud in Red Hat OpenShift AI and NetApp ONTAP Environment","conversation":{"__ref":"Conversation:conversation:339884"},"id":"message:339884","revisionNum":25,"uid":339884,"depth":0,"board":{"__ref":"Tkb:board:TechnicalArticles"},"author":{"__ref":"User:user:421692"},"teaser@stripHtml({\"removeProcessingText\":true,\"truncateLength\":-1})":"","introduction":"","metrics":{"__typename":"MessageMetrics","views":119},"postTime":"2025-02-24T19:51:18.469-08:00","lastPublishTime":"2025-02-24T19:51:18.469-08:00","body@stripHtml({\"removeProcessingText\":true,\"removeSpoilerMarkup\":true,\"removeTocMarkup\":true,\"truncateLength\":-1})":" Introduction \n Retrieval Augmented Generation (RAG) is a powerful technique that allows Large Language Models (LLMs) to access information beyond their training data. The “R” in RAG refers to the data retrieval process, where the system retrieves relevant information from an external knowledge base based on the input query. Next, the “A” in RAG represents the augmentation of context enrichment, as the system combines the retrieved relevant information and the input query to create a more comprehensive prompt for the LLM. Lastly, the “G” in RAG stands for response generation, where the LLM generates a response with a more contextually accurate output based on the augmented prompt as a result.\u0026nbsp; \n RAG is becoming increasingly popular in enterprise AI applications due to its ability to provide more accurate and contextually relevant responses to a wide range of queries. However, deploying RAG can introduce complexity due to its components being located in different environments. For instance, the datastore or corpus, which is a collection of data, is typically on-premise for enhanced control over data access and management due to data security, governance, and compliance with regulations within the enterprise. Meanwhile, inference services are often deployed in the cloud for their scalability and cost-effectiveness.\u0026nbsp;\u0026nbsp; \n In this article, we will discuss how F5 Distributed Cloud can simplify the complexity and securely connect all RAG components seamlessly for enterprise RAG-enabled AI applications deployments. Specifically, we will focus on Network Connect, App Connect, and Web App \u0026amp; API Protection. We will demonstrate how these F5 Distributed Cloud features can be leveraged to secure RAG in collaboration with Red Hat OpenShift AI and NetApp ONTAP. \n Example Topology \n \n \u0026nbsp; \n F5 Distributed Cloud Network Connect\u0026nbsp; \n F5 Distributed Cloud Network Connect enables seamless and secure network connectivity across hybrid and multicloud environments. By deploying F5 Distributed Cloud Customer Edge (CE) at site, it allows us to easily establish encrypted site-to-site connectivity across on-premises, multi-cloud, and edge environment.\u0026nbsp; \u0026nbsp;\u0026nbsp; \n Jensen Huang, CEO of NVIDIA, has said that \"Nearly half of the files in the world are stored on-prem on NetApp.”.\u0026nbsp; In our example, enterprise data stores are deployed on NetApp ONTAP in a data center in Seattle managed by organization B (Segment-B: s-gorman-production-segment), while RAG services, including embedding Large Language Model (LLM) and vector database, is deployed on-premise on a Red Hat OpenShift cluster in a data center in California managed by Organization A (Segment-A: jy-ocp). By leveraging F5 Distributed Cloud Network Connect, we can quickly and easily establish a secure connection for seamless and efficient data transfer from the enterprise data stores to RAG services between these two segments only: \n \n F5 Distributed Cloud CE can be deployed as a virtual machine (VM) or as a pod on a Red Hat OpenShift cluster. In California, we deploy the CE as a VM using Red Hat OpenShift Virtualization —\u0026nbsp; click here to find out more on\u0026nbsp;Deploying F5 Distributed Cloud Customer Edge in Red Hat OpenShift Virtualization: \n \n Segment-A: jy-ocp on CE in California and Segment-B: s-gorman-production-segment on CE in Seattle: \n \n Simply and securely connect\u0026nbsp;Segment-A: jy-ocp and Segment-B: s-gorman-production-segment only,\u0026nbsp; using Segment Connector: \n \n NetApp ONTAP in Seattle has a LUN named “tbd-RAG”, which serves as the enterprise data store in our demo setup and contains a collection of data. After these two data centers are connected using F5 XC Network Connect, a secure encrypted end-to-end connection is established between them. In our example, “test-ai-tbd” is in the data center in California where it hosts the RAG services, including embedding Large Language Model (LLM) and vector database, and it can now successfully connect to the enterprise data stores on NetApp ONTAP in the data center in Seattle: \n \n F5 Distributed Cloud App Connect\u0026nbsp; \n F5 Distributed Cloud App Connect securely connects and delivers distributed applications and services across hybrid and multicloud environments. By utilizing F5 Distributed Cloud App Connect, we can direct the inference traffic through F5 Distributed Cloud's security layers to safeguard our inference endpoints.\u0026nbsp; \n \n Red Hat OpenShift on Amazon Web Services (ROSA) is a fully managed service that allows users to develop, run, and scale applications in a native AWS environment. We can host our inference service on ROSA so that we can leverage the scalability, cost-effectiveness, and numerous benefits of AWS’s managed infrastructure services. For instance, we can host our inference service on ROSA by deploying Ollama with multiple AI/ML models: \n \n Or, we can enable Model Serving on Red Hat OpenShift AI (RHOAI). Red Hat OpenShift AI (RHOAI) is a flexible and scalable AI/ML platform builds on the capabilities of Red Hat OpenShift that facilitates collaboration among data scientists, engineers, and app developers. This platform allows them to serve, build, train, deploy, test, and monitor AI/ML models and applications either on-premise or in the cloud, fostering efficient innovation within organizations. In our example, we use Red Hat OpenShift AI (RHOAI) Model Serving on ROSA for our inference service: \n \n Once inference service is deployed on ROSA, we can utilize F5 Distributed Cloud to secure our inference endpoint by steering the inference traffic through F5 Distributed Cloud's security layers, which offers an extensive suite of features designed specifically for the security of modern AI/ML inference endpoints. This setup would allow us to scrutinize requests, implement policies for detected threats, and protect sensitive datasets before they reach the inferencing service hosted within ROSA. In our example, we setup a F5 Distributed Cloud HTTP Load Balancer (rhoai-llm-serving.f5-demo.com), and we advertise it to the CE in the datacenter in California only: \n \n We now reach our Red Hat OpenShift AI (RHOAI) inference endpoint through F5 Distributed Cloud: \n \n F5 Distributed Cloud Web App \u0026amp; API Protection\u0026nbsp; \n F5 Distributed Cloud Web App \u0026amp; API Protection provides comprehensive sets of security features, and uniform observability and policy enforcement to protect apps and APIs across hybrid and multicloud environments. We utilize F5 Distributed Cloud App Connect to steer the inference traffic through F5 Distributed Cloud to secure our inference endpoint. In our example, we protect our Red Hat OpenShift AI (RHOAI)\u0026nbsp;inference endpoint by rate-limiting the access, so that we can ensure no single client would exhaust the inference service: \n \n A \"Too Many Requests\" is received in the response when a single client repeatedly requests access to the inference service at a rate higher than the configured threshold: \n \n This is just one of the many security features to protect our inference service. Click here to find out more on\u0026nbsp;Securing Model Serving in Red Hat OpenShift AI (on ROSA) with F5 Distributed Cloud API Security.\u0026nbsp; \n Demonstration\u0026nbsp;\u0026nbsp; \n In a real-world scenario, the front-end application could be hosted on the cloud, or hosted at the edge, or served through F5 Distributed Cloud, offering flexible alternatives for efficient application delivery based on user preferences and specific needs. To illustrate how all the discussed components work seamlessly together, we simplify our example by deploying Open WebUI as the front-end application on the Red Hat OpenShift cluster in the data center in California, which includes RAG services. While a DPU or GPU could be used for improved performance, our setup utilizes a CPU for inferencing tasks.\u0026nbsp; \n We connect our app to our enterprise data stores deployed on NetApp ONTAP in the data center in Seattle using\u0026nbsp;F5 Distributed Cloud Network Connect, where we have a copy of \"Chapter 1. About the Migration Toolkit for Virtualization\" from Red Hat. These documents are processed and saved to the Vector DB: \n \n Our embedding Large Language Model (LLM) is Sentence-Transformers/all-MiniLM-L6-v2, and here is our RAG template: \n \n Instead of connecting to the inference endpoint on Red Hat OpenShift AI (RHOAI) on ROSA directly, we connect to the F5 Distributed Cloud HTTP Load Balancer (rhoai-llm-serving.f5-demo.com) from\u0026nbsp;F5 Distributed Cloud App Connect: \n \n Previously, we asked, \"What is MTV?“ and we never received a response related to Red Hat Migration Toolkit for Virtualization: \n \n Now, let's try asking the same question again with RAG services enabled:\u0026nbsp; \n \n We finally received the response we had anticipated.\u0026nbsp; \n Next, we use F5 Distributed Cloud Web App \u0026amp; API Protection to safeguard our Red Hat OpenShift AI (RHOAI) inference endpoint on ROSA by rate-limiting the access, thus preventing a single client from exhausting the inference service:\u0026nbsp; \n \n As expected, we received \"Too Many Requests\" in the response on our app upon requesting the inference service at a rate greater than the set threshold: \n \n With F5 Distributed Cloud's real-time observability and security analytics from the F5 Distributed Console, we can proactively monitor for potential threats. For example, if necessary, we can block a client from accessing the inference service by adding it to the Blocked Clients List: \n \n As expected, this specific client is now unable to access the inference service: \n \n Summary \n Deploying and securing RAG for enterprise RAG-enabled AI applications in a multi-vendor, hybrid, and multi-cloud environment can present complex challenges. In collaboration with Red Hat OpenShift AI (RHOAI) and NetApp ONTAP, F5 Distributed Cloud provides an effortless solution that secures RAG components seamlessly for enterprise RAG-enabled AI applications. ","body@stripHtml({\"removeProcessingText\":true,\"removeSpoilerMarkup\":true,\"removeTocMarkup\":true,\"truncateLength\":-1})@stringLength":"10043","kudosSumWeight":0,"repliesCount":0,"readOnly":false,"images":{"__typename":"AssociatedImageConnection","edges":[{"__typename":"AssociatedImageEdge","cursor":"MjUuMXwyLjF8b3wyNXxfTlZffDE","node":{"__ref":"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0zMzk4ODQtWVU1amF6?revision=25\"}"}},{"__typename":"AssociatedImageEdge","cursor":"MjUuMXwyLjF8b3wyNXxfTlZffDI","node":{"__ref":"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0zMzk4ODQtYXEzVmNL?revision=25\"}"}},{"__typename":"AssociatedImageEdge","cursor":"MjUuMXwyLjF8b3wyNXxfTlZffDM","node":{"__ref":"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0zMzk4ODQtSmJNZ3Ry?revision=25\"}"}},{"__typename":"AssociatedImageEdge","cursor":"MjUuMXwyLjF8b3wyNXxfTlZffDQ","node":{"__ref":"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0zMzk4ODQtSVJiZ3dK?revision=25\"}"}},{"__typename":"AssociatedImageEdge","cursor":"MjUuMXwyLjF8b3wyNXxfTlZffDU","node":{"__ref":"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0zMzk4ODQtTHA2SDc0?revision=25\"}"}},{"__typename":"AssociatedImageEdge","cursor":"MjUuMXwyLjF8b3wyNXxfTlZffDY","node":{"__ref":"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0zMzk4ODQtdTFySzhB?revision=25\"}"}},{"__typename":"AssociatedImageEdge","cursor":"MjUuMXwyLjF8b3wyNXxfTlZffDc","node":{"__ref":"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0zMzk4ODQtN1dLVFhZ?revision=25\"}"}},{"__typename":"AssociatedImageEdge","cursor":"MjUuMXwyLjF8b3wyNXxfTlZffDg","node":{"__ref":"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0zMzk4ODQtS3RzbXJl?revision=25\"}"}},{"__typename":"AssociatedImageEdge","cursor":"MjUuMXwyLjF8b3wyNXxfTlZffDk","node":{"__ref":"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0zMzk4ODQtc0l2OTBl?revision=25\"}"}},{"__typename":"AssociatedImageEdge","cursor":"MjUuMXwyLjF8b3wyNXxfTlZffDEw","node":{"__ref":"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0zMzk4ODQtNGlPcnZQ?revision=25\"}"}},{"__typename":"AssociatedImageEdge","cursor":"MjUuMXwyLjF8b3wyNXxfTlZffDEx","node":{"__ref":"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0zMzk4ODQtbUtVeVYz?revision=25\"}"}},{"__typename":"AssociatedImageEdge","cursor":"MjUuMXwyLjF8b3wyNXxfTlZffDEy","node":{"__ref":"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0zMzk4ODQtRVBsOVg3?revision=25\"}"}},{"__typename":"AssociatedImageEdge","cursor":"MjUuMXwyLjF8b3wyNXxfTlZffDEz","node":{"__ref":"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0zMzk4ODQtdUJkT0V0?revision=25\"}"}},{"__typename":"AssociatedImageEdge","cursor":"MjUuMXwyLjF8b3wyNXxfTlZffDE0","node":{"__ref":"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0zMzk4ODQtd2YxMEQ3?revision=25\"}"}},{"__typename":"AssociatedImageEdge","cursor":"MjUuMXwyLjF8b3wyNXxfTlZffDE1","node":{"__ref":"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0zMzk4ODQtZDF2R25C?revision=25\"}"}},{"__typename":"AssociatedImageEdge","cursor":"MjUuMXwyLjF8b3wyNXxfTlZffDE2","node":{"__ref":"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0zMzk4ODQtdGV0Sk53?revision=25\"}"}},{"__typename":"AssociatedImageEdge","cursor":"MjUuMXwyLjF8b3wyNXxfTlZffDE3","node":{"__ref":"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0zMzk4ODQtZjdZOEU3?revision=25\"}"}},{"__typename":"AssociatedImageEdge","cursor":"MjUuMXwyLjF8b3wyNXxfTlZffDE4","node":{"__ref":"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0zMzk4ODQtV2xodXRO?revision=25\"}"}},{"__typename":"AssociatedImageEdge","cursor":"MjUuMXwyLjF8b3wyNXxfTlZffDE5","node":{"__ref":"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0zMzk4ODQtS2ZzOW5O?revision=25\"}"}},{"__typename":"AssociatedImageEdge","cursor":"MjUuMXwyLjF8b3wyNXxfTlZffDIw","node":{"__ref":"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0zMzk4ODQta2xHUGlO?revision=25\"}"}},{"__typename":"AssociatedImageEdge","cursor":"MjUuMXwyLjF8b3wyNXxfTlZffDIx","node":{"__ref":"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0zMzk4ODQtbmp0UFR4?revision=25\"}"}},{"__typename":"AssociatedImageEdge","cursor":"MjUuMXwyLjF8b3wyNXxfTlZffDIy","node":{"__ref":"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0zMzk4ODQtZU05eG1o?revision=25\"}"}},{"__typename":"AssociatedImageEdge","cursor":"MjUuMXwyLjF8b3wyNXxfTlZffDIz","node":{"__ref":"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0zMzk4ODQtWE1saWtw?revision=25\"}"}},{"__typename":"AssociatedImageEdge","cursor":"MjUuMXwyLjF8b3wyNXxfTlZffDI0","node":{"__ref":"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0zMzk4ODQtTllHYk9Z?revision=25\"}"}},{"__typename":"AssociatedImageEdge","cursor":"MjUuMXwyLjF8b3wyNXxfTlZffDI1","node":{"__ref":"AssociatedImage:{\"url\":\"https://community.f5.com/t5/s/zihoc95639/images/bS0zMzk4ODQtclVkT3E3?revision=25\"}"}}],"totalCount":28,"pageInfo":{"__typename":"PageInfo","hasNextPage":true,"endCursor":"MjUuMXwyLjF8b3wyNXxfTlZffDI1","hasPreviousPage":false,"startCursor":null}},"videos":{"__typename":"VideoConnection","edges":[],"totalCount":0,"pageInfo":{"__typename":"PageInfo","hasNextPage":false,"endCursor":null,"hasPreviousPage":false,"startCursor":null}}},"CachedAsset:text:en_US-components/community/Navbar-1740415743150":{"__typename":"CachedAsset","id":"text:en_US-components/community/Navbar-1740415743150","value":{"community":"Community Home","inbox":"Inbox","manageContent":"Manage Content","tos":"Terms of Service","forgotPassword":"Forgot Password","themeEditor":"Theme Editor","edit":"Edit Navigation Bar","skipContent":"Skip to content","migrated-link-9":"Groups","migrated-link-7":"Technical Articles","migrated-link-8":"DevCentral News","migrated-link-1":"Technical Forum","migrated-link-10":"Community Groups","migrated-link-2":"Water Cooler","migrated-link-11":"F5 Groups","Common-external-link":"How Do I...?","migrated-link-0":"Forums","article-series":"Article Series","migrated-link-5":"Community Articles","migrated-link-6":"Articles","security-insights":"Security Insights","migrated-link-3":"CrowdSRC","migrated-link-4":"CodeShare","migrated-link-12":"Events","migrated-link-13":"Suggestions"},"localOverride":false},"CachedAsset:text:en_US-components/community/NavbarHamburgerDropdown-1740415743150":{"__typename":"CachedAsset","id":"text:en_US-components/community/NavbarHamburgerDropdown-1740415743150","value":{"hamburgerLabel":"Side Menu"},"localOverride":false},"CachedAsset:text:en_US-components/community/BrandLogo-1740415743150":{"__typename":"CachedAsset","id":"text:en_US-components/community/BrandLogo-1740415743150","value":{"logoAlt":"Khoros","themeLogoAlt":"Brand Logo"},"localOverride":false},"CachedAsset:text:en_US-components/community/NavbarTextLinks-1740415743150":{"__typename":"CachedAsset","id":"text:en_US-components/community/NavbarTextLinks-1740415743150","value":{"more":"More"},"localOverride":false},"CachedAsset:text:en_US-components/authentication/AuthenticationLink-1740415743150":{"__typename":"CachedAsset","id":"text:en_US-components/authentication/AuthenticationLink-1740415743150","value":{"title.login":"Sign In","title.registration":"Register","title.forgotPassword":"Forgot Password","title.multiAuthLogin":"Sign In"},"localOverride":false},"CachedAsset:text:en_US-components/nodes/NodeLink-1740415743150":{"__typename":"CachedAsset","id":"text:en_US-components/nodes/NodeLink-1740415743150","value":{"place":"Place {name}"},"localOverride":false},"CachedAsset:text:en_US-components/tags/TagSubscriptionAction-1740415743150":{"__typename":"CachedAsset","id":"text:en_US-components/tags/TagSubscriptionAction-1740415743150","value":{"success.follow.title":"Following Tag","success.unfollow.title":"Unfollowed Tag","success.follow.message.followAcrossCommunity":"You will be notified when this tag is used anywhere across the community","success.unfollowtag.message":"You will no longer be notified when this tag is used anywhere in this place","success.unfollowtagAcrossCommunity.message":"You will no longer be notified when this tag is used anywhere across the community","unexpected.error.title":"Error - Action Failed","unexpected.error.message":"An unidentified problem occurred during the action you took. Please try again later.","buttonTitle":"{isSubscribed, select, true {Unfollow} false {Follow} other{}}","unfollow":"Unfollow"},"localOverride":false},"CachedAsset:text:en_US-components/messages/MessageListTabs-1740415743150":{"__typename":"CachedAsset","id":"text:en_US-components/messages/MessageListTabs-1740415743150","value":{"mostKudoed":"{value, select, IDEA {Most Votes} other {Most Likes}}","mostReplies":"Most Replies","mostViewed":"Most Viewed","newest":"{value, select, IDEA {Newest Ideas} OCCASION {Newest Events} other {Newest Topics}}","newestOccasions":"Newest Events","mostRecent":"Most Recent","noReplies":"No Replies Yet","noSolutions":"No Solutions Yet","solutions":"Solutions","mostRecentUserContent":"Most Recent","trending":"Trending","draft":"Drafts","spam":"Spam","abuse":"Abuse","moderation":"Moderation","tags":"Tags","PAST":"Past","UPCOMING":"Upcoming","sortBymostRecent":"Sort By Most Recent","sortBymostRecentUserContent":"Sort By Most Recent","sortBymostKudoed":"Sort By Most Likes","sortBymostReplies":"Sort By Most Replies","sortBymostViewed":"Sort By Most Viewed","sortBynewest":"Sort By Newest Topics","sortBynewestOccasions":"Sort By Newest Events","otherTabs":" Messages list in the {tab} for {conversationStyle}","guides":"Guides","archives":"Archives"},"localOverride":false},"CachedAsset:text:en_US-shared/client/components/common/QueryHandler-1740415743150":{"__typename":"CachedAsset","id":"text:en_US-shared/client/components/common/QueryHandler-1740415743150","value":{"title":"Query Handler"},"localOverride":false},"Category:category:top":{"__typename":"Category","id":"category:top","nodeType":"category"},"CachedAsset:text:en_US-components/community/NavbarDropdownToggle-1740415743150":{"__typename":"CachedAsset","id":"text:en_US-components/community/NavbarDropdownToggle-1740415743150","value":{"ariaLabelClosed":"Press the down arrow to open the menu"},"localOverride":false},"CachedAsset:text:en_US-shared/client/components/common/OverflowNav-1740415743150":{"__typename":"CachedAsset","id":"text:en_US-shared/client/components/common/OverflowNav-1740415743150","value":{"toggleText":"More"},"localOverride":false},"CachedAsset:text:en_US-components/messages/MessageView/MessageViewInline-1740415743150":{"__typename":"CachedAsset","id":"text:en_US-components/messages/MessageView/MessageViewInline-1740415743150","value":{"bylineAuthor":"{bylineAuthor}","bylineBoard":"{bylineBoard}","anonymous":"Anonymous","place":"Place {bylineBoard}","gotoParent":"Go to parent {name}"},"localOverride":false},"CachedAsset:text:en_US-shared/client/components/common/Pager/PagerLoadMore-1740415743150":{"__typename":"CachedAsset","id":"text:en_US-shared/client/components/common/Pager/PagerLoadMore-1740415743150","value":{"loadMore":"Show More"},"localOverride":false},"CachedAsset:text:en_US-components/customComponent/CustomComponent-1740415743150":{"__typename":"CachedAsset","id":"text:en_US-components/customComponent/CustomComponent-1740415743150","value":{"errorMessage":"Error rendering component id: {customComponentId}","bannerTitle":"Video provider requires cookies to play the video. Accept to continue or {url} it directly on the provider's site.","buttonTitle":"Accept","urlText":"watch"},"localOverride":false},"CachedAsset:text:en_US-components/users/UserLink-1740415743150":{"__typename":"CachedAsset","id":"text:en_US-components/users/UserLink-1740415743150","value":{"authorName":"View Profile: {author}","anonymous":"Anonymous"},"localOverride":false},"CachedAsset:text:en_US-components/messages/MessageSubject-1740415743150":{"__typename":"CachedAsset","id":"text:en_US-components/messages/MessageSubject-1740415743150","value":{"noSubject":"(no subject)"},"localOverride":false},"CachedAsset:text:en_US-components/messages/MessageBody-1740415743150":{"__typename":"CachedAsset","id":"text:en_US-components/messages/MessageBody-1740415743150","value":{"showMessageBody":"Show More","mentionsErrorTitle":"{mentionsType, select, board {Board} user {User} message {Message} other {}} No Longer Available","mentionsErrorMessage":"The {mentionsType} you are trying to view has been removed from the community.","videoProcessing":"Video is being processed. Please try again in a few minutes.","bannerTitle":"Video provider requires cookies to play the video. Accept to continue or {url} it directly on the provider's site.","buttonTitle":"Accept","urlText":"watch"},"localOverride":false},"CachedAsset:text:en_US-components/messages/MessageTime-1740415743150":{"__typename":"CachedAsset","id":"text:en_US-components/messages/MessageTime-1740415743150","value":{"postTime":"Published: {time}","lastPublishTime":"Last Update: {time}","conversation.lastPostingActivityTime":"Last posting activity time: {time}","conversation.lastPostTime":"Last post time: {time}","moderationData.rejectTime":"Rejected time: {time}"},"localOverride":false},"CachedAsset:text:en_US-shared/client/components/nodes/NodeIcon-1740415743150":{"__typename":"CachedAsset","id":"text:en_US-shared/client/components/nodes/NodeIcon-1740415743150","value":{"contentType":"Content Type {style, select, FORUM {Forum} BLOG {Blog} TKB {Knowledge Base} IDEA {Ideas} OCCASION {Events} other {}} icon"},"localOverride":false},"CachedAsset:text:en_US-components/messages/MessageUnreadCount-1740415743150":{"__typename":"CachedAsset","id":"text:en_US-components/messages/MessageUnreadCount-1740415743150","value":{"unread":"{count} unread","comments":"{count, plural, one {\u003cspanCount\u003e\u003c/spanCount\u003e\u003cspanText\u003e unread comment\u003c/spanText\u003e} other{\u003cspanCount\u003e\u003c/spanCount\u003e\u003cspanText\u003e unread comments\u003c/spanText\u003e}}"},"localOverride":false},"CachedAsset:text:en_US-components/messages/MessageViewCount-1740415743150":{"__typename":"CachedAsset","id":"text:en_US-components/messages/MessageViewCount-1740415743150","value":{"textTitle":"{count, plural,one {\u003cspanCount\u003e\u003c/spanCount\u003e\u003cspanText\u003eView\u003c/spanText\u003e} other{\u003cspanCount\u003e\u003c/spanCount\u003e\u003cspanText\u003eViews\u003c/spanText\u003e}}","views":"{count, plural, one{View} other{Views}}"},"localOverride":false},"CachedAsset:text:en_US-components/kudos/KudosCount-1740415743150":{"__typename":"CachedAsset","id":"text:en_US-components/kudos/KudosCount-1740415743150","value":{"textTitle":"{count, plural,one {\u003cspanKudos\u003e\u003c/spanKudos\u003e\u003cspanText\u003e{messageType, select, IDEA{Vote} other{Like}}\u003c/spanText\u003e} other{\u003cspanKudos\u003e\u003c/spanKudos\u003e\u003cspanText\u003e{messageType, select, IDEA{Votes} other{Likes}}\u003c/spanText\u003e}}","likes":"{count, plural, one{like} other{likes}}"},"localOverride":false},"CachedAsset:text:en_US-components/messages/MessageRepliesCount-1740415743150":{"__typename":"CachedAsset","id":"text:en_US-components/messages/MessageRepliesCount-1740415743150","value":{"textTitle":"{count, plural,one {\u003cspanCount\u003e\u003c/spanCount\u003e\u003cspanText\u003e{conversationStyle, select, IDEA{Comment} OCCASION{Comment} other{Reply}}\u003c/spanText\u003e} other{\u003cspanCount\u003e\u003c/spanCount\u003e\u003cspanText\u003e{conversationStyle, select, IDEA{Comments} OCCASION{Comments} other{Replies}}\u003c/spanText\u003e}}","comments":"{count, plural, one{Comment} other{Comments}}"},"localOverride":false},"CachedAsset:text:en_US-components/messages/MessageSolvedBadge-1740415743150":{"__typename":"CachedAsset","id":"text:en_US-components/messages/MessageSolvedBadge-1740415743150","value":{"solved":"Solved"},"localOverride":false},"CachedAsset:text:en_US-shared/client/components/users/UserAvatar-1740415743150":{"__typename":"CachedAsset","id":"text:en_US-shared/client/components/users/UserAvatar-1740415743150","value":{"altText":"{login}'s avatar","altTextGeneric":"User's avatar"},"localOverride":false}}}},"page":"/tags/TagPage/TagPage","query":{"tagName":"security"},"buildId":"UtG3-Pbti3STtL2t_tPEH","runtimeConfig":{"buildInformationVisible":false,"logLevelApp":"info","logLevelMetrics":"info","openTelemetryClientEnabled":false,"openTelemetryConfigName":"f5","openTelemetryServiceVersion":"25.1.0","openTelemetryUniverse":"prod","openTelemetryCollector":"http://localhost:4318","openTelemetryRouteChangeAllowedTime":"5000","apolloDevToolsEnabled":false,"inboxMuteWipFeatureEnabled":false},"isFallback":false,"isExperimentalCompile":false,"dynamicIds":["LiUyRmNvbXBvbmVudHMlMkZjdXN0b21Db21wb25lbnQlMkZDdXN0b21Db21wb25lbnQlMkZDdXN0b21Db21wb25lbnQudHN4","LiUyRmNvbXBvbmVudHMlMkZjb21tdW5pdHklMkZOYXZiYXIlMkZOYXZiYXJXaWRnZXQudHN4","LiUyRmNvbXBvbmVudHMlMkZjb21tdW5pdHklMkZCcmVhZGNydW1iJTJGQnJlYWRjcnVtYldpZGdldC50c3g=","LiUyRmNvbXBvbmVudHMlMkZ0YWdzJTJGVGFnc0hlYWRlcldpZGdldCUyRlRhZ3NIZWFkZXJXaWRnZXQudHN4","LiUyRmNvbXBvbmVudHMlMkZtZXNzYWdlcyUyRk1lc3NhZ2VMaXN0Rm9yTm9kZUJ5UmVjZW50QWN0aXZpdHlXaWRnZXQlMkZNZXNzYWdlTGlzdEZvck5vZGVCeVJlY2VudEFjdGl2aXR5V2lkZ2V0LnRzeA==","LiUyRmNvbXBvbmVudHMlMkZ0YWdzJTJGVGFnU3Vic2NyaXB0aW9uQWN0aW9uJTJGVGFnU3Vic2NyaXB0aW9uQWN0aW9uLnRzeA==","Li4lMkZzaGFyZWQlMkZjbGllbnQlMkZjb21wb25lbnRzJTJGY29tbW9uJTJGTGlzdCUyRkxpc3RHcm91cCUyRkxpc3RHcm91cC50c3g=","LiUyRmNvbXBvbmVudHMlMkZtZXNzYWdlcyUyRk1lc3NhZ2VWaWV3JTJGTWVzc2FnZVZpZXcudHN4","LiUyRmNvbXBvbmVudHMlMkZtZXNzYWdlcyUyRk1lc3NhZ2VWaWV3JTJGTWVzc2FnZVZpZXdJbmxpbmUlMkZNZXNzYWdlVmlld0lubGluZS50c3g=","Li4lMkZzaGFyZWQlMkZjbGllbnQlMkZjb21wb25lbnRzJTJGY29tbW9uJTJGUGFnZXIlMkZQYWdlckxvYWRNb3JlJTJGUGFnZXJMb2FkTW9yZS50c3g=","LiUyRmNvbXBvbmVudHMlMkZjdXN0b21Db21wb25lbnQlMkZDdXN0b21Db21wb25lbnRDb250ZW50JTJGQ3VzdG9tQ29tcG9uZW50U2NyaXB0cy50c3g="],"appGip":true,"scriptLoader":[]}</script><script lang="javascript" type="text/javascript"> const nextDataScript = document.getElementById("__NEXT_DATA__"); if (nextDataScript) { const nextData = JSON.parse(nextDataScript.textContent || '{}'); if (nextData.dynamicIds) { nextData.dynamicIds = nextData.dynamicIds.map(id => { const encodedString = atob(id); return decodeURIComponent(encodedString); }); nextDataScript.textContent = JSON.stringify(nextData); } } </script></body></html>

Pages: 1 2 3 4 5 6 7 8 9 10