Featured Group Content
This section shows featured content the Group Owner has highlighted.Group Content
how to run the below bash file on f5
Hello, I would like to extract a list of all virtual servers , profiles and certificates on my F5 ; I found the below script but I dont know how to run it on f5.Where should I place the cert-mapping file ? In which folder on f5 ? Log on to the BIG-IP command line. Note: Command line access defaults to the bash shell. Using a text editor, create the cert-mapping file. Place the following bash script contents in the cert-mapping file: #!/bin/bash # Search /config and sub directories (partitions) for bigip.conf files LIST=`find /config -name bigip.conf | xargs awk '$2 == "virtual" {print $3}' 2> /dev/null | sort -u` echo "Virtual: Profile: Certificate: Ciphers:" echo "__________________________________________________________" for VAL in ${LIST} do PROF=`tmsh show /ltm virtual ${VAL} profiles 2> /dev/null | grep -B 1 " Ltm::ClientSSL Profile:" | cut -d: -f4 | grep -i "[a-z]" | sed s'/ //'g| sort -u` test -n "${PROF}" 2>&- && { VIRTS=`expr $VIRTS + 1` for PCRT in ${PROF} do CERT=`tmsh list /ltm profile client-ssl ${PCRT} | awk '$1 == "cert" {print $2}' 2> /dev/null | sort -u` test -n "${CERT}" 2>&- && { CIPHERS=`tmsh list /ltm profile client-ssl ${PCRT} ciphers | grep ciphers | awk '{print $2}'` echo "${VAL} ${PCRT} ${CERT} ${CIPHERS}" } done } done echo "Virtual server count: ${VIRTS}" Note: To alter this script to search for server-ssl profile certificates, replace client-ssl with server-ssl and Ltm::ClientSSL Profile: with Ltm::ServerSSL Profile:. Close the text editor savingthe filecert-mappingthat contains the bash script. To execute the script type the following command: bash ./cert-mapping Thansk in advance. Best Regards,Solved1.9KViews0likes5CommentsF5 iRUule not working
This is API Application rather than web browser. Source URL: https://mule-dev-openai-lb.ucsf.edu/tccog2/openai/deployments/tccognitivedeployment/completions?api-version=2022-12-01 Destination URL: https://tccog2.openai.azure.com/openai/deployments/tccognitivedeployment/completions?api-version=2022-12-01 tccog2 – azure openai instance name irule Requirements: 1) destination host translation (prepend openai.azure.com with azure openai instance name) Immediate resource after the host name in the source url is extracted and prepended in the dest host name. As shown in the example above tccog2 is extracted from source url and prepended in the dest host name tccog2.openai.azure.com. 2) uri path translation (remove the azure openai instance name from uri path) Rest of the uri path (/openai/deployments/tccognitivedeployment/completions?api-version=2022-12-01) after the first resource from the host name is extracted and send us the destination uri path after the host name. Following irule is not working to satisfy the above requirements: when HTTP_REQUEST { if { [HTTP::host] equals "mule-dev-openai-lb.ucsf.edu"} { if { [HTTP::path] equals "/tccog2" } { set newUri [string range [HTTP::uri] [string first / [HTTP::uri] 1] end] set HTTP::uri ${newUri} HTTP::redirect "https://tccog2.openai.azure.com[HTTP::uri]" } } }Solved1.7KViews0likes6CommentsCapture the Flag!
Hey there community...are you ready to capture the flag? We'll get the competition dates nailed down in the next week, but here are the details: This CTF will be an individual exercise hosted in the F5 UDF environment. By commenting on this thread, we'll add you to the list and you'll get an invite to the competition. The CTF will open June 21st at noon pacific and close June 24th at noon pacific. This first CTF is not F5-centric, just an opportunity to grow or flash your red team skills against a very flawed web application. There are no prizes associated, but we'll highlight the podium finishers on the DevCentral Connects live stream on June 28th. We can't wait to see how everyone does! Update Jun 17th: If you commented below, you should have an invite in your inbox. This will give you access to the vulnerable web application you will be attacking. To track your flags, please register at https://ctf.jimmypackets.com. Happy hunting!1.6KViews10likes28CommentsCollecting all pool/member stats from all partitions - Coding Live - May 26, 2023
I got a question in the technical forums on how to pull all stats for pools and members from all partitions with the iControl REST interface. Digging in, it doesn't appear to be possible directly unless using the deprecated soap iControl interface or building an iControl LX package. In this episode of Coding Live, I will pursue an alternative using tmsh scripting and then a single iControl REST request to download the stats file. Resources Resulting TMSH Script to collect the stats Resulting Python Script to run the tmsh script and download the stats Automate your F5 BIG-IP using VScode Extension - YouTube DevCentral Connects: Extending VS Code - YouTube TMSH Scripting Home TMSH Reference Guide BIG-IP Interface Stats in Real Time with a TMSH Sc... - DevCentral Config Search - DevCentral1KViews1like3CommentsNext Community Lab Day - Vote on what you'd like to see!
Hey everyone, we hope those of you that participated had fun withJRahm'sDevCentral Connects hosts Capture the Flag! We'd like to give the option for everyone to select what our next hands-on event will be. Below are 3 options. All you need to do is click Kudos (make sure you're logged in) on the lab that you'd like to see us put on. Nothing is stopping you from Kudo'ing multple labs if you want to boost 2 of them. If you don't like any of these labs, drop a comment and let us know what you'd rather see! We'll leave this poll open for a bit to give everyone a chance to see it. Cheers, BuuSolved844Views1like7CommentsThis Month In Security Episode 12: July, 2023 - CyberSecurity Apprenticeships, Large Language Models
If you're hitting up BlackHat 2023, you're going to hear a LOT about Large Language Model security, which dominated the news this month in security. Also, Aubrey King talks with Jason Ross, from Rochester Institute of Technology and Jenn Carlson, from Apprenti, about cybersecurity apprenticeship options.822Views3likes0CommentsSSL handshake failed
Hello All, We have added our webserver to F5 and attached it to Virtual server. We can see Local traffic data in Statistics for the Pool. But we are getting SSL Handshake failed for TCP x.x.x.x:80 -> x.x.x.x:443. (This is for Webserver and F5 BIG-IP) Could you please let us know the troublehsooting steps to clear this. Your assist will be of great help to us. Thanks Archana799Views0likes6Comments
About DevCentral Connects
All about the DevCentral Connects LiveStreams.
Owned by: AubreyKingF5, JRahm, buulam, Rebecca_Moloney, Leslie_Hubertus, and 2 moreCreated: 3 years agoOpen Group
Boards
DCC Forum
A by-request forum where viewers may engage with show hosts - before, during, and after LiveStreams.
Nov 20, 2024104 Posts