Getting Started with iRules: Events & Priorities
As this series steams on we go deeper and deeper into what actually drives iRules as a technology. So far we have covered very basic concepts, from core programming ideas and F5 basic terminology thr...
Updated Oct 02, 2023
Version 3.0JRahm
Admin
Joined January 20, 2005
JRahm
Admin
Joined January 20, 2005
gsharri
Apr 04, 2019Altostratus
Hi Jason. Great stuff here. My students are always asking about this type of thing so thanks for posting this. However, am I misunderstanding something here in the diagrams? In my experiments with a vip, which has an APM access policy and ASM security policy, the access policy sees the request before the security policy. For example I have a L7 acl in the access policy to deny the uri path /stopme/*. When I request that uri the APM acl blocks me and the request never appears in the ASM request log.